BibTeX records: Dan Boneh

download as .bib file

@article{DBLP:journals/algorithmica/BonehZ17,
  author    = {Dan Boneh and
               Mark Zhandry},
  title     = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from
               Indistinguishability Obfuscation},
  journal   = {Algorithmica},
  volume    = {79},
  number    = {4},
  pages     = {1233--1285},
  year      = {2017},
  url       = {https://doi.org/10.1007/s00453-016-0242-8},
  doi       = {10.1007/s00453-016-0242-8},
  timestamp = {Mon, 09 Oct 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/algorithmica/BonehZ17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/BonehKN17,
  author    = {Dan Boneh and
               Sam Kim and
               Valeria Nikolaenko},
  title     = {Lattice-Based {DAPS} and Generalizations: Self-enforcement in Signature
               Schemes},
  booktitle = {Applied Cryptography and Network Security - 15th International Conference,
               {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  pages     = {457--477},
  year      = {2017},
  crossref  = {DBLP:conf/acns/2017},
  url       = {https://doi.org/10.1007/978-3-319-61204-1_23},
  doi       = {10.1007/978-3-319-61204-1_23},
  timestamp = {Tue, 04 Jul 2017 13:27:06 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/BonehKN17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BonehG17,
  author    = {Dan Boneh and
               Shay Gueron},
  title     = {Surnaming Schemes, Fast Verification, and Applications to {SGX} Technology},
  booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
               the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
               2017, Proceedings},
  pages     = {149--164},
  year      = {2017},
  crossref  = {DBLP:conf/ctrsa/2017},
  url       = {https://doi.org/10.1007/978-3-319-52153-4_9},
  doi       = {10.1007/978-3-319-52153-4_9},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/BonehG17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehISW17,
  author    = {Dan Boneh and
               Yuval Ishai and
               Amit Sahai and
               David J. Wu},
  title     = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  pages     = {247--277},
  year      = {2017},
  crossref  = {DBLP:conf/eurocrypt/2017-3},
  url       = {https://doi.org/10.1007/978-3-319-56617-7_9},
  doi       = {10.1007/978-3-319-56617-7_9},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehISW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehKM17,
  author    = {Dan Boneh and
               Sam Kim and
               Hart William Montgomery},
  title     = {Private Puncturable PRFs from Standard Lattice Assumptions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  pages     = {415--445},
  year      = {2017},
  crossref  = {DBLP:conf/eurocrypt/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-56620-7_15},
  doi       = {10.1007/978-3-319-56620-7_15},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehKM17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/hotos/Corrigan-GibbsW17,
  author    = {Henry Corrigan{-}Gibbs and
               David J. Wu and
               Dan Boneh},
  title     = {Quantum Operating Systems},
  booktitle = {Proceedings of the 16th Workshop on Hot Topics in Operating Systems,
               HotOS 2017, Whistler, BC, Canada, May 8-10, 2017},
  pages     = {76--81},
  year      = {2017},
  crossref  = {DBLP:conf/hotos/2017},
  url       = {http://doi.acm.org/10.1145/3102980.3102993},
  doi       = {10.1145/3102980.3102993},
  timestamp = {Wed, 16 Aug 2017 08:41:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/hotos/Corrigan-GibbsW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/WilsonWCBLW17,
  author    = {Judson Wilson and
               Riad S. Wahby and
               Henry Corrigan{-}Gibbs and
               Dan Boneh and
               Philip Levis and
               Keith Winstein},
  title     = {Trust but Verify: Auditing the Secure Internet of Things},
  booktitle = {Proceedings of the 15th Annual International Conference on Mobile
               Systems, Applications, and Services, MobiSys'17, Niagara Falls, NY,
               USA, June 19-23, 2017},
  pages     = {464--474},
  year      = {2017},
  crossref  = {DBLP:conf/mobisys/2017},
  url       = {http://doi.acm.org/10.1145/3081333.3081342},
  doi       = {10.1145/3081333.3081342},
  timestamp = {Tue, 20 Jun 2017 12:43:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/mobisys/WilsonWCBLW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/Corrigan-GibbsB17,
  author    = {Henry Corrigan{-}Gibbs and
               Dan Boneh},
  title     = {Prio: Private, Robust, and Scalable Computation of Aggregate Statistics},
  booktitle = {14th {USENIX} Symposium on Networked Systems Design and Implementation,
               {NSDI} 2017, Boston, MA, USA, March 27-29, 2017},
  pages     = {259--282},
  year      = {2017},
  crossref  = {DBLP:conf/nsdi/2017},
  url       = {https://www.usenix.org/conference/nsdi17/technical-sessions/presentation/corrigan-gibbs},
  timestamp = {Tue, 28 Mar 2017 15:12:16 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/nsdi/Corrigan-GibbsB17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BonehLW17,
  author    = {Dan Boneh and
               Kevin Lewi and
               David J. Wu},
  title     = {Constraining Pseudorandom Functions Privately},
  booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  pages     = {494--524},
  year      = {2017},
  crossref  = {DBLP:conf/pkc/2017-2},
  url       = {https://doi.org/10.1007/978-3-662-54388-7_17},
  doi       = {10.1007/978-3-662-54388-7_17},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pkc/BonehLW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/EskandarianMBB17,
  author    = {Saba Eskandarian and
               Eran Messeri and
               Joe Bonneau and
               Dan Boneh},
  title     = {Certificate Transparency with Privacy},
  journal   = {CoRR},
  volume    = {abs/1703.02209},
  year      = {2017},
  url       = {http://arxiv.org/abs/1703.02209},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/EskandarianMBB17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/Corrigan-GibbsB17,
  author    = {Henry Corrigan{-}Gibbs and
               Dan Boneh},
  title     = {Prio: Private, Robust, and Scalable Computation of Aggregate Statistics},
  journal   = {CoRR},
  volume    = {abs/1703.06255},
  year      = {2017},
  url       = {http://arxiv.org/abs/1703.06255},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/Corrigan-GibbsB17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/TramerPGBM17,
  author    = {Florian Tram{\`{e}}r and
               Nicolas Papernot and
               Ian J. Goodfellow and
               Dan Boneh and
               Patrick D. McDaniel},
  title     = {The Space of Transferable Adversarial Examples},
  journal   = {CoRR},
  volume    = {abs/1704.03453},
  year      = {2017},
  url       = {http://arxiv.org/abs/1704.03453},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/TramerPGBM17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/TramerKPBM17,
  author    = {Florian Tram{\`{e}}r and
               Alexey Kurakin and
               Nicolas Papernot and
               Dan Boneh and
               Patrick D. McDaniel},
  title     = {Ensemble Adversarial Training: Attacks and Defenses},
  journal   = {CoRR},
  volume    = {abs/1705.07204},
  year      = {2017},
  url       = {http://arxiv.org/abs/1705.07204},
  timestamp = {Mon, 12 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/TramerKPBM17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-08424,
  author    = {Dmitry Kogan and
               Nathan Manohar and
               Dan Boneh},
  title     = {T/Key: Second-Factor Authentication From Secure Hash Chains},
  journal   = {CoRR},
  volume    = {abs/1708.08424},
  year      = {2017},
  url       = {http://arxiv.org/abs/1708.08424},
  timestamp = {Tue, 05 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1708-08424},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehKM17,
  author    = {Dan Boneh and
               Sam Kim and
               Hart William Montgomery},
  title     = {Private Puncturable PRFs From Standard Lattice Assumptions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {100},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/100},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehKM17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehISW17,
  author    = {Dan Boneh and
               Yuval Ishai and
               Amit Sahai and
               David J. Wu},
  title     = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {240},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/240},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehISW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehGGK17,
  author    = {Dan Boneh and
               Rosario Gennaro and
               Steven Goldfeder and
               Sam Kim},
  title     = {A Lattice-Based Universal Thresholdizer for Cryptographic Systems},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {251},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/251},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehGGK17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehKW17,
  author    = {Dan Boneh and
               Sam Kim and
               David J. Wu},
  title     = {Constrained Keys for Invertible Pseudorandom Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {477},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/477},
  timestamp = {Wed, 21 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehKW17},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieeesp/LevyCB16,
  author    = {Amit Levy and
               Henry Corrigan{-}Gibbs and
               Dan Boneh},
  title     = {Stickler: Defending against Malicious Content Distribution Networks
               in an Unmodified Browser},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {14},
  number    = {2},
  pages     = {22--28},
  year      = {2016},
  url       = {https://doi.org/10.1109/MSP.2016.32},
  doi       = {10.1109/MSP.2016.32},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieeesp/LevyCB16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ieeesp/BonehPS16,
  author    = {Dan Boneh and
               Kenny Paterson and
               Nigel P. Smart},
  title     = {Building a Community of Real-World Cryptographers},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {14},
  number    = {6},
  pages     = {7--9},
  year      = {2016},
  url       = {https://doi.org/10.1109/MSP.2016.127},
  doi       = {10.1109/MSP.2016.127},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ieeesp/BonehPS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehCS16,
  author    = {Dan Boneh and
               Henry Corrigan{-}Gibbs and
               Stuart E. Schechter},
  title     = {Balloon Hashing: {A} Memory-Hard Function Providing Provable Protection
               Against Sequential Attacks},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  pages     = {220--248},
  year      = {2016},
  crossref  = {DBLP:conf/asiacrypt/2016-1},
  url       = {https://doi.org/10.1007/978-3-662-53887-6_8},
  doi       = {10.1007/978-3-662-53887-6_8},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BonehCS16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LewiMACFWABK016,
  author    = {Kevin Lewi and
               Alex J. Malozemoff and
               Daniel Apon and
               Brent Carmer and
               Adam Foltzer and
               Daniel Wagner and
               David W. Archer and
               Dan Boneh and
               Jonathan Katz and
               Mariana Raykova},
  title     = {5Gen: {A} Framework for Prototyping Applications Using Multilinear
               Maps and Matrix Branching Programs},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {981--992},
  year      = {2016},
  crossref  = {DBLP:conf/ccs/2016},
  url       = {http://doi.acm.org/10.1145/2976749.2978314},
  doi       = {10.1145/2976749.2978314},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/LewiMACFWABK016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WuTSB16,
  author    = {David J. Wu and
               Ankur Taly and
               Asim Shankar and
               Dan Boneh},
  title     = {Privacy, Discovery, and Authentication for the Internet of Things},
  booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
               in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
               Part {II}},
  pages     = {301--319},
  year      = {2016},
  crossref  = {DBLP:conf/esorics/2016-2},
  url       = {https://doi.org/10.1007/978-3-319-45741-3_16},
  doi       = {10.1007/978-3-319-45741-3_16},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/esorics/WuTSB16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ewsn/KininghamHLB16,
  author    = {Kevin Kiningham and
               Mark Horowitz and
               Philip Levis and
               Dan Boneh},
  title     = {{CESEL:} Securing a Mote for 20 Years},
  booktitle = {Proceedings of the International Conference on Embedded Wireless Systems
               and Networks, {EWSN} 2016, Graz, Austria, 15-17 February 2016},
  pages     = {307--312},
  year      = {2016},
  crossref  = {DBLP:conf/ewsn/2016},
  url       = {http://dl.acm.org/citation.cfm?id=2893788},
  timestamp = {Mon, 14 Mar 2016 14:41:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ewsn/KininghamHLB16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/SchrijversBBR16,
  author    = {Okke Schrijvers and
               Joseph Bonneau and
               Dan Boneh and
               Tim Roughgarden},
  title     = {Incentive Compatibility of Bitcoin Mining Pool Reward Functions},
  booktitle = {Financial Cryptography and Data Security - 20th International Conference,
               {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
               Selected Papers},
  pages     = {477--498},
  year      = {2016},
  crossref  = {DBLP:conf/fc/2016},
  url       = {https://doi.org/10.1007/978-3-662-54970-4_28},
  doi       = {10.1007/978-3-662-54970-4_28},
  timestamp = {Wed, 17 May 2017 11:08:36 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/SchrijversBBR16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/WuTSB16,
  author    = {David J. Wu and
               Ankur Taly and
               Asim Shankar and
               Dan Boneh},
  title     = {Privacy, Discovery, and Authentication for the Internet of Things},
  journal   = {CoRR},
  volume    = {abs/1604.06959},
  year      = {2016},
  url       = {http://arxiv.org/abs/1604.06959},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/WuTSB16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/Corrigan-GibbsB16,
  author    = {Henry Corrigan{-}Gibbs and
               Dan Boneh and
               Stuart E. Schechter},
  title     = {Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent
               Access Patterns},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {27},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/027},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/Corrigan-GibbsB16},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/LewiMACFWABK016,
  author    = {Kevin Lewi and
               Alex J. Malozemoff and
               Daniel Apon and
               Brent Carmer and
               Adam Foltzer and
               Daniel Wagner and
               David W. Archer and
               Dan Boneh and
               Jonathan Katz and
               Mariana Raykova},
  title     = {5Gen: {A} Framework for Prototyping Applications Using Multilinear
               Maps and Matrix Branching Programs},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {619},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/619},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/LewiMACFWABK016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/AhnBCHSW15,
  author    = {Jae Hyun Ahn and
               Dan Boneh and
               Jan Camenisch and
               Susan Hohenberger and
               Abhi Shelat and
               Brent Waters},
  title     = {Computing on Authenticated Data},
  journal   = {J. Cryptology},
  volume    = {28},
  number    = {2},
  pages     = {351--395},
  year      = {2015},
  url       = {https://doi.org/10.1007/s00145-014-9182-0},
  doi       = {10.1007/s00145-014-9182-0},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/joc/AhnBCHSW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DagherBBCB15,
  author    = {Gaby G. Dagher and
               Benedikt B{\"{u}}nz and
               Joseph Bonneau and
               Jeremy Clark and
               Dan Boneh},
  title     = {Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-6, 2015},
  pages     = {720--731},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {http://doi.acm.org/10.1145/2810103.2813674},
  doi       = {10.1145/2810103.2813674},
  timestamp = {Sat, 03 Oct 2015 19:54:04 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/DagherBBCB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MashtizadehBBM15,
  author    = {Ali Jos{\'{e}} Mashtizadeh and
               Andrea Bittau and
               Dan Boneh and
               David Mazi{\`{e}}res},
  title     = {{CCFI:} Cryptographically Enforced Control Flow Integrity},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-6, 2015},
  pages     = {941--951},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  url       = {http://doi.acm.org/10.1145/2810103.2813676},
  doi       = {10.1145/2810103.2813676},
  timestamp = {Sat, 03 Oct 2015 19:54:04 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/MashtizadehBBM15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Boneh0MS15,
  author    = {Dan Boneh and
               Divya Gupta and
               Ilya Mironov and
               Amit Sahai},
  title     = {Hosting Services on an Untrusted Cloud},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  pages     = {404--436},
  year      = {2015},
  crossref  = {DBLP:conf/eurocrypt/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-46803-6_14},
  doi       = {10.1007/978-3-662-46803-6_14},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/Boneh0MS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehL0SZZ15,
  author    = {Dan Boneh and
               Kevin Lewi and
               Mariana Raykova and
               Amit Sahai and
               Mark Zhandry and
               Joe Zimmerman},
  title     = {Semantically Secure Order-Revealing Encryption: Multi-input Functional
               Encryption Without Obfuscation},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  pages     = {563--594},
  year      = {2015},
  crossref  = {DBLP:conf/eurocrypt/2015-2},
  url       = {https://doi.org/10.1007/978-3-662-46803-6_19},
  doi       = {10.1007/978-3-662-46803-6_19},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehL0SZZ15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/Corrigan-GibbsB15,
  author    = {Henry Corrigan{-}Gibbs and
               Dan Boneh and
               David Mazi{\`{e}}res},
  title     = {Riposte: An Anonymous Messaging System Handling Millions of Users},
  booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  pages     = {321--338},
  year      = {2015},
  crossref  = {DBLP:conf/sp/2015},
  url       = {https://doi.org/10.1109/SP.2015.27},
  doi       = {10.1109/SP.2015.27},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/Corrigan-GibbsB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/MichalevskySVBN15,
  author    = {Yan Michalevsky and
               Aaron Schulman and
               Gunaa Arumugam Veerapandian and
               Dan Boneh and
               Gabi Nakibly},
  title     = {PowerSpy: Location Tracking Using Mobile Device Power Analysis},
  booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
               D.C., USA, August 12-14, 2015.},
  pages     = {785--800},
  year      = {2015},
  crossref  = {DBLP:conf/uss/2015},
  url       = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/michalevsky},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/MichalevskySVBN15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/MichalevskyNSB15,
  author    = {Yan Michalevsky and
               Gabi Nakibly and
               Aaron Schulman and
               Dan Boneh},
  title     = {PowerSpy: Location Tracking using Mobile Device Power Analysis},
  journal   = {CoRR},
  volume    = {abs/1502.03182},
  year      = {2015},
  url       = {http://arxiv.org/abs/1502.03182},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/MichalevskyNSB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/Corrigan-GibbsB15,
  author    = {Henry Corrigan{-}Gibbs and
               Dan Boneh and
               David Mazi{\`{e}}res},
  title     = {Riposte: An Anonymous Messaging System Handling Millions of Users},
  journal   = {CoRR},
  volume    = {abs/1503.06115},
  year      = {2015},
  url       = {http://arxiv.org/abs/1503.06115},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/Corrigan-GibbsB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/BraunJB15,
  author    = {Benjamin A. Braun and
               Suman Jana and
               Dan Boneh},
  title     = {Robust and Efficient Elimination of Cache and Timing Side Channels},
  journal   = {CoRR},
  volume    = {abs/1506.00189},
  year      = {2015},
  url       = {http://arxiv.org/abs/1506.00189},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/BraunJB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/LevyCB15,
  author    = {Amit Levy and
               Henry Corrigan{-}Gibbs and
               Dan Boneh},
  title     = {Stickler: Defending Against Malicious CDNs in an Unmodified Browser},
  journal   = {CoRR},
  volume    = {abs/1506.04110},
  year      = {2015},
  url       = {http://arxiv.org/abs/1506.04110},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/LevyCB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehLMR15,
  author    = {Dan Boneh and
               Kevin Lewi and
               Hart William Montgomery and
               Ananth Raghunathan},
  title     = {Key Homomorphic PRFs and Their Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {220},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/220},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehLMR15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AbadiBMRS15,
  author    = {Mart{\'{\i}}n Abadi and
               Dan Boneh and
               Ilya Mironov and
               Ananth Raghunathan and
               Gil Segev},
  title     = {Message-Locked Encryption for Lock-Dependent Messages},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {440},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/440},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/AbadiBMRS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/DagherBBCB15,
  author    = {Gaby G. Dagher and
               Benedikt B{\"{u}}nz and
               Joseph Bonneau and
               Jeremy Clark and
               Dan Boneh},
  title     = {Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1008},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1008},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/DagherBBCB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehLW15,
  author    = {Dan Boneh and
               Kevin Lewi and
               David J. Wu},
  title     = {Constraining Pseudorandom Functions Privately},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {1167},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1167},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehLW15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/BojinovSRBL14,
  author    = {Hristo Bojinov and
               Daniel S{\'{a}}nchez and
               Paul J. Reber and
               Dan Boneh and
               Patrick Lincoln},
  title     = {Neuroscience meets cryptography: crypto primitives secure against
               rubber hose attacks},
  journal   = {Commun. {ACM}},
  volume    = {57},
  number    = {5},
  pages     = {110--118},
  year      = {2014},
  url       = {http://doi.acm.org/10.1145/2594445},
  doi       = {10.1145/2594445},
  timestamp = {Fri, 21 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cacm/BojinovSRBL14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/internet/HuangABJ14,
  author    = {Lin{-}Shung Huang and
               Shrikant Adhikarla and
               Dan Boneh and
               Collin Jackson},
  title     = {An Experimental Study of {TLS} Forward Secrecy Deployments},
  journal   = {{IEEE} Internet Computing},
  volume    = {18},
  number    = {6},
  pages     = {43--51},
  year      = {2014},
  url       = {https://doi.org/10.1109/MIC.2014.86},
  doi       = {10.1109/MIC.2014.86},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/internet/HuangABJ14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehC14,
  author    = {Dan Boneh and
               Henry Corrigan{-}Gibbs},
  title     = {Bivariate Polynomials Modulo Composites and Their Applications},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  pages     = {42--62},
  year      = {2014},
  crossref  = {DBLP:conf/asiacrypt/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-45611-8_3},
  doi       = {10.1007/978-3-662-45611-8_3},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BonehC14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehWZ14,
  author    = {Dan Boneh and
               Brent Waters and
               Mark Zhandry},
  title     = {Low Overhead Broadcast Encryption from Multilinear Maps},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  pages     = {206--223},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-44371-2_12},
  doi       = {10.1007/978-3-662-44371-2_12},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehWZ14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehZ14,
  author    = {Dan Boneh and
               Mark Zhandry},
  title     = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from
               Indistinguishability Obfuscation},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  pages     = {480--499},
  year      = {2014},
  crossref  = {DBLP:conf/crypto/2014-1},
  url       = {https://doi.org/10.1007/978-3-662-44371-2_27},
  doi       = {10.1007/978-3-662-44371-2_27},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehZ14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehGGHNSVV14,
  author    = {Dan Boneh and
               Craig Gentry and
               Sergey Gorbunov and
               Shai Halevi and
               Valeria Nikolaenko and
               Gil Segev and
               Vinod Vaikuntanathan and
               Dhinakaran Vinayagamurthy},
  title     = {Fully Key-Homomorphic Encryption, Arithmetic Circuit {ABE} and Compact
               Garbled Circuits},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  pages     = {533--556},
  year      = {2014},
  crossref  = {DBLP:conf/eurocrypt/2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5_30},
  doi       = {10.1007/978-3-642-55220-5_30},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehGGHNSVV14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/BittauBMMB14,
  author    = {Andrea Bittau and
               Adam Belay and
               Ali Jos{\'{e}} Mashtizadeh and
               David Mazi{\`{e}}res and
               Dan Boneh},
  title     = {Hacking Blind},
  booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
               CA, USA, May 18-21, 2014},
  pages     = {227--242},
  year      = {2014},
  crossref  = {DBLP:conf/sp/2014},
  url       = {https://doi.org/10.1109/SP.2014.22},
  doi       = {10.1109/SP.2014.22},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/BittauBMMB14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/SilverJBCJ14,
  author    = {David Silver and
               Suman Jana and
               Dan Boneh and
               Eric Yawei Chen and
               Collin Jackson},
  title     = {Password Managers: Attacks and Defenses},
  booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
               USA, August 20-22, 2014.},
  pages     = {449--464},
  year      = {2014},
  crossref  = {DBLP:conf/uss/2014},
  url       = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/silver},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/SilverJBCJ14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/MichalevskyBN14,
  author    = {Yan Michalevsky and
               Dan Boneh and
               Gabi Nakibly},
  title     = {Gyrophone: Recognizing Speech from Gyroscope Signals},
  booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
               USA, August 20-22, 2014.},
  pages     = {1053--1067},
  year      = {2014},
  crossref  = {DBLP:conf/uss/2014},
  url       = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/michalevsky},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/MichalevskyBN14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/woot/HoBBP14,
  author    = {Grant Ho and
               Dan Boneh and
               Lucas Ballard and
               Niels Provos},
  title     = {Tick Tock: Building Browser Red Pills from Timing Side Channels},
  booktitle = {8th {USENIX} Workshop on Offensive Technologies, {WOOT} '14, San Diego,
               CA, USA, August 19, 2014.},
  year      = {2014},
  crossref  = {DBLP:conf/woot/2014},
  url       = {https://www.usenix.org/conference/woot14/workshop-program/presentation/ho},
  timestamp = {Thu, 11 Sep 2014 17:28:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/woot/HoBBP14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/BojinovMNB14,
  author    = {Hristo Bojinov and
               Yan Michalevsky and
               Gabi Nakibly and
               Dan Boneh},
  title     = {Mobile Device Identification via Sensor Fingerprinting},
  journal   = {CoRR},
  volume    = {abs/1408.1416},
  year      = {2014},
  url       = {http://arxiv.org/abs/1408.1416},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/BojinovMNB14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/MashtizadehBMB14,
  author    = {Ali Jos{\'{e}} Mashtizadeh and
               Andrea Bittau and
               David Mazi{\`{e}}res and
               Dan Boneh},
  title     = {Cryptographically Enforced Control Flow Integrity},
  journal   = {CoRR},
  volume    = {abs/1408.1451},
  year      = {2014},
  url       = {http://arxiv.org/abs/1408.1451},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/MashtizadehBMB14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehWZ14,
  author    = {Dan Boneh and
               Brent Waters and
               Mark Zhandry},
  title     = {Low Overhead Broadcast Encryption from Multilinear Maps},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {195},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/195},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehWZ14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehGGHNSVV14,
  author    = {Dan Boneh and
               Craig Gentry and
               Sergey Gorbunov and
               Shai Halevi and
               Valeria Nikolaenko and
               Gil Segev and
               Vinod Vaikuntanathan and
               Dhinakaran Vinayagamurthy},
  title     = {Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact
               Garbled Circuits},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {356},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/356},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehGGHNSVV14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehC14,
  author    = {Dan Boneh and
               Henry Corrigan{-}Gibbs},
  title     = {Bivariate Polynomials Modulo Composites and their Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {719},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/719},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehC14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehLRSZZ14,
  author    = {Dan Boneh and
               Kevin Lewi and
               Mariana Raykova and
               Amit Sahai and
               Mark Zhandry and
               Joe Zimmerman},
  title     = {Semantically Secure Order-Revealing Encryption: Multi-Input Functional
               Encryption Without Obfuscation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {834},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/834},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehLRSZZ14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehWZ14a,
  author    = {Dan Boneh and
               David J. Wu and
               Joe Zimmerman},
  title     = {Immunizing Multilinear Maps Against Zeroizing Attacks},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {930},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/930},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehWZ14a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/BonehGHWW13,
  author    = {Dan Boneh and
               Craig Gentry and
               Shai Halevi and
               Frank Wang and
               David J. Wu},
  title     = {Private Database Queries Using Somewhat Homomorphic Encryption},
  booktitle = {Applied Cryptography and Network Security - 11th International Conference,
               {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  pages     = {102--118},
  year      = {2013},
  crossref  = {DBLP:conf/acns/2013},
  url       = {https://doi.org/10.1007/978-3-642-38980-1_7},
  doi       = {10.1007/978-3-642-38980-1_7},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/BonehGHWW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehRS13,
  author    = {Dan Boneh and
               Ananth Raghunathan and
               Gil Segev},
  title     = {Function-Private Subspace-Membership Encryption and Its Applications},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  pages     = {255--275},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-42033-7_14},
  doi       = {10.1007/978-3-642-42033-7_14},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BonehRS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehW13,
  author    = {Dan Boneh and
               Brent Waters},
  title     = {Constrained Pseudorandom Functions and Their Applications},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  pages     = {280--300},
  year      = {2013},
  crossref  = {DBLP:conf/asiacrypt/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-42045-0_15},
  doi       = {10.1007/978-3-642-42045-0_15},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BonehW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Corrigan-GibbsMBF13,
  author    = {Henry Corrigan{-}Gibbs and
               Wendy Mu and
               Dan Boneh and
               Bryan Ford},
  title     = {Ensuring high-quality randomness in cryptographic key generation},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {685--696},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013},
  url       = {http://doi.acm.org/10.1145/2508859.2516680},
  doi       = {10.1145/2508859.2516680},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/Corrigan-GibbsMBF13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NikolaenkoIWJTB13,
  author    = {Valeria Nikolaenko and
               Stratis Ioannidis and
               Udi Weinsberg and
               Marc Joye and
               Nina Taft and
               Dan Boneh},
  title     = {Privacy-preserving matrix factorization},
  booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  pages     = {801--812},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013},
  url       = {http://doi.acm.org/10.1145/2508859.2516751},
  doi       = {10.1145/2508859.2516751},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/NikolaenkoIWJTB13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehZ13,
  author    = {Dan Boneh and
               Mark Zhandry},
  title     = {Secure Signatures and Chosen Ciphertext Security in a Quantum Computing
               World},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  pages     = {361--379},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-40084-1_21},
  doi       = {10.1007/978-3-642-40084-1_21},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehZ13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbadiBMRS13,
  author    = {Mart{\'{\i}}n Abadi and
               Dan Boneh and
               Ilya Mironov and
               Ananth Raghunathan and
               Gil Segev},
  title     = {Message-Locked Encryption for Lock-Dependent Messages},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  pages     = {374--391},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-40041-4_21},
  doi       = {10.1007/978-3-642-40041-4_21},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/AbadiBMRS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehLMR13,
  author    = {Dan Boneh and
               Kevin Lewi and
               Hart William Montgomery and
               Ananth Raghunathan},
  title     = {Key Homomorphic PRFs and Their Applications},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  pages     = {410--428},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-1},
  url       = {https://doi.org/10.1007/978-3-642-40041-4_23},
  doi       = {10.1007/978-3-642-40041-4_23},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehLMR13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehRS13,
  author    = {Dan Boneh and
               Ananth Raghunathan and
               Gil Segev},
  title     = {Function-Private Identity-Based Encryption: Hiding the Function in
               Functional Encryption},
  booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  pages     = {461--478},
  year      = {2013},
  crossref  = {DBLP:conf/crypto/2013-2},
  url       = {https://doi.org/10.1007/978-3-642-40084-1_26},
  doi       = {10.1007/978-3-642-40084-1_26},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehRS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehZ13,
  author    = {Dan Boneh and
               Mark Zhandry},
  title     = {Quantum-Secure Message Authentication Codes},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  pages     = {592--608},
  year      = {2013},
  crossref  = {DBLP:conf/eurocrypt/2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9_35},
  doi       = {10.1007/978-3-642-38348-9_35},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehZ13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pet/FifieldNB13,
  author    = {David Fifield and
               Gabi Nakibly and
               Dan Boneh},
  title     = {{OSS:} Using Online Scanning Services for Censorship Circumvention},
  booktitle = {Privacy Enhancing Technologies - 13th International Symposium, {PETS}
               2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings},
  pages     = {185--204},
  year      = {2013},
  crossref  = {DBLP:conf/pet/2013},
  url       = {https://doi.org/10.1007/978-3-642-39077-7_10},
  doi       = {10.1007/978-3-642-39077-7_10},
  timestamp = {Tue, 23 May 2017 01:10:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pet/FifieldNB13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/NikolaenkoWIJBT13,
  author    = {Valeria Nikolaenko and
               Udi Weinsberg and
               Stratis Ioannidis and
               Marc Joye and
               Dan Boneh and
               Nina Taft},
  title     = {Privacy-Preserving Ridge Regression on Hundreds of Millions of Records},
  booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
               CA, USA, May 19-22, 2013},
  pages     = {334--348},
  year      = {2013},
  crossref  = {DBLP:conf/sp/2013},
  url       = {https://doi.org/10.1109/SP.2013.30},
  doi       = {10.1109/SP.2013.30},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/NikolaenkoWIJBT13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2013,
  editor    = {Dan Boneh and
               Tim Roughgarden and
               Joan Feigenbaum},
  title     = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
               USA, June 1-4, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2488608},
  isbn      = {978-1-4503-2029-0},
  timestamp = {Sun, 26 May 2013 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/Corrigan-GibbsMBF13,
  author    = {Henry Corrigan{-}Gibbs and
               Wendy Mu and
               Dan Boneh and
               Bryan Ford},
  title     = {Ensuring High-Quality Randomness in Cryptographic Key Generation},
  journal   = {CoRR},
  volume    = {abs/1309.7366},
  year      = {2013},
  url       = {http://arxiv.org/abs/1309.7366},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/Corrigan-GibbsMBF13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehZ13,
  author    = {Dan Boneh and
               Mark Zhandry},
  title     = {Secure Signatures and Chosen Ciphertext Security in a Post-Quantum
               World},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {88},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/088},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehZ13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehRS13,
  author    = {Dan Boneh and
               Ananth Raghunathan and
               Gil Segev},
  title     = {Function-Private Identity-Based Encryption: Hiding the Function in
               Functional Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {283},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/283},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehRS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehW13,
  author    = {Dan Boneh and
               Brent Waters},
  title     = {Constrained Pseudorandom Functions and Their Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {352},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/352},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehRS13a,
  author    = {Dan Boneh and
               Ananth Raghunathan and
               Gil Segev},
  title     = {Function-Private Subspace-Membership Encryption and Its Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {403},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/403},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehRS13a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehGHWW13,
  author    = {Dan Boneh and
               Craig Gentry and
               Shai Halevi and
               Frank Wang and
               David J. Wu},
  title     = {Private Database Queries Using Somewhat Homomorphic Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {422},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/422},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehGHWW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehZ13a,
  author    = {Dan Boneh and
               Mark Zhandry},
  title     = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from
               Indistinguishability Obfuscation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {642},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/642},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehZ13a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehNS13,
  author    = {Dan Boneh and
               Valeria Nikolaenko and
               Gil Segev},
  title     = {Attribute-Based Encryption for Arithmetic Circuits},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {669},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/669},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehNS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AnanthBGSZ13,
  author    = {Prabhanjan Ananth and
               Dan Boneh and
               Sanjam Garg and
               Amit Sahai and
               Mark Zhandry},
  title     = {Differing-Inputs Obfuscation and Applications},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2013},
  pages     = {689},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/689},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/AnanthBGSZ13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/BonehSW12,
  author    = {Dan Boneh and
               Amit Sahai and
               Brent Waters},
  title     = {Functional encryption: a new vision for public-key cryptography},
  journal   = {Commun. {ACM}},
  volume    = {55},
  number    = {11},
  pages     = {56--64},
  year      = {2012},
  url       = {http://doi.acm.org/10.1145/2366316.2366333},
  doi       = {10.1145/2366316.2366333},
  timestamp = {Sat, 17 Nov 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cacm/BonehSW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/pieee/LandwehrBMBLL12,
  author    = {Carl E. Landwehr and
               Dan Boneh and
               John C. Mitchell and
               Steven M. Bellovin and
               Susan Landau and
               Michael E. Lesk},
  title     = {Privacy and Cybersecurity: The Next 100 Years},
  journal   = {Proceedings of the {IEEE}},
  volume    = {100},
  number    = {Centennial-Issue},
  pages     = {1659--1673},
  year      = {2012},
  url       = {https://doi.org/10.1109/JPROC.2012.2189794},
  doi       = {10.1109/JPROC.2012.2189794},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/pieee/LandwehrBMBLL12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Boneh12,
  author    = {Dan Boneh},
  title     = {Pairing-Based Cryptography: Past, Present, and Future},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  pages     = {1},
  year      = {2012},
  crossref  = {DBLP:conf/asiacrypt/2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4_1},
  doi       = {10.1007/978-3-642-34961-4_1},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/Boneh12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GeorgievIJABS12,
  author    = {Martin Georgiev and
               Subodh Iyengar and
               Suman Jana and
               Rishita Anubhai and
               Dan Boneh and
               Vitaly Shmatikov},
  title     = {The most dangerous code in the world: validating {SSL} certificates
               in non-browser software},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {38--49},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {http://doi.acm.org/10.1145/2382196.2382204},
  doi       = {10.1145/2382196.2382204},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/GeorgievIJABS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WeinbergWYBCWB12,
  author    = {Zachary Weinberg and
               Jeffrey Wang and
               Vinod Yegneswaran and
               Linda Briesemeister and
               Steven Cheung and
               Frank Wang and
               Dan Boneh},
  title     = {StegoTorus: a camouflage proxy for the Tor anonymity system},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {109--120},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {http://doi.acm.org/10.1145/2382196.2382211},
  doi       = {10.1145/2382196.2382211},
  timestamp = {Thu, 01 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/WeinbergWYBCWB12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BonehSW12,
  author    = {Dan Boneh and
               Gil Segev and
               Brent Waters},
  title     = {Targeted malleability: homomorphic encryption for restricted computations},
  booktitle = {Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA,
               January 8-10, 2012},
  pages     = {350--366},
  year      = {2012},
  crossref  = {DBLP:conf/innovations/2012},
  url       = {http://doi.acm.org/10.1145/2090236.2090264},
  doi       = {10.1145/2090236.2090264},
  timestamp = {Sat, 24 Mar 2012 15:58:31 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/innovations/BonehSW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NakiblyKGB12,
  author    = {Gabi Nakibly and
               Alex Kirshon and
               Dima Gonikman and
               Dan Boneh},
  title     = {Persistent {OSPF} Attacks},
  booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS}
               2012, San Diego, California, USA, February 5-8, 2012},
  year      = {2012},
  crossref  = {DBLP:conf/ndss/2012},
  url       = {http://www.internetsociety.org/persistent-ospf-attacks},
  timestamp = {Wed, 18 Sep 2013 19:36:26 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/NakiblyKGB12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/StarkHIJB12,
  author    = {Emily Stark and
               Lin{-}Shung Huang and
               Dinesh Israni and
               Collin Jackson and
               Dan Boneh},
  title     = {The Case for Prefetching and Prevalidating {TLS} Server Certificates},
  booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS}
               2012, San Diego, California, USA, February 5-8, 2012},
  year      = {2012},
  crossref  = {DBLP:conf/ndss/2012},
  url       = {http://www.internetsociety.org/case-prefetching-and-prevalidating-tls-server-certificates},
  timestamp = {Wed, 18 Sep 2013 19:36:26 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/StarkHIJB12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pet/FifieldHESBDP12,
  author    = {David Fifield and
               Nate Hardison and
               Jonathan Ellithorpe and
               Emily Stark and
               Dan Boneh and
               Roger Dingledine and
               Phillip A. Porras},
  title     = {Evading Censorship with Browser-Based Proxies},
  booktitle = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
               2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  pages     = {239--258},
  year      = {2012},
  crossref  = {DBLP:conf/pet/2012},
  url       = {https://doi.org/10.1007/978-3-642-31680-7_13},
  doi       = {10.1007/978-3-642-31680-7_13},
  timestamp = {Tue, 23 May 2017 01:10:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pet/FifieldHESBDP12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AhnBCHSW12,
  author    = {Jae Hyun Ahn and
               Dan Boneh and
               Jan Camenisch and
               Susan Hohenberger and
               Abhi Shelat and
               Brent Waters},
  title     = {Computing on Authenticated Data},
  booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  pages     = {1--20},
  year      = {2012},
  crossref  = {DBLP:conf/tcc/2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9_1},
  doi       = {10.1007/978-3-642-28914-9_1},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/AhnBCHSW12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/BojinovSRBL12,
  author    = {Hristo Bojinov and
               Daniel S{\'{a}}nchez and
               Paul J. Reber and
               Dan Boneh and
               Patrick Lincoln},
  title     = {Neuroscience Meets Cryptography: Designing Crypto Primitives Secure
               Against Rubber Hose Attacks},
  booktitle = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
               USA, August 8-10, 2012},
  pages     = {129--141},
  year      = {2012},
  crossref  = {DBLP:conf/uss/2012},
  url       = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/bojinov},
  timestamp = {Fri, 21 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/BojinovSRBL12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/LincolnMPYWMSVB12,
  author    = {Patrick Lincoln and
               Ian Mason and
               Phillip A. Porras and
               Vinod Yegneswaran and
               Zachary Weinberg and
               Jeroen Massar and
               William Allen Simpson and
               Paul Vixie and
               Dan Boneh},
  title     = {Bootstrapping Communications into an Anti-Censorship System},
  booktitle = {2nd {USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} '12, Bellevue, WA, USA, August 6, 2012},
  year      = {2012},
  crossref  = {DBLP:conf/uss/2012foci},
  url       = {https://www.usenix.org/conference/foci12/workshop-program/presentation/lincoln},
  timestamp = {Tue, 20 May 2014 19:56:41 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/LincolnMPYWMSVB12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/www/ThiagarajanANBS12,
  author    = {Narendran Thiagarajan and
               Gaurav Aggarwal and
               Angela Nicoara and
               Dan Boneh and
               Jatinder Pal Singh},
  title     = {Who killed my battery?: analyzing mobile browser energy consumption},
  booktitle = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012,
               Lyon, France, April 16-20, 2012},
  pages     = {41--50},
  year      = {2012},
  crossref  = {DBLP:conf/www/2012},
  url       = {http://doi.acm.org/10.1145/2187836.2187843},
  doi       = {10.1145/2187836.2187843},
  timestamp = {Thu, 19 Apr 2012 14:34:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/www/ThiagarajanANBS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/www/BurszteinSBM12,
  author    = {Elie Bursztein and
               Chinmay Soman and
               Dan Boneh and
               John C. Mitchell},
  title     = {SessionJuggler: secure web login from an untrusted terminal using
               session hijacking},
  booktitle = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012,
               Lyon, France, April 16-20, 2012},
  pages     = {321--330},
  year      = {2012},
  crossref  = {DBLP:conf/www/2012},
  url       = {http://doi.acm.org/10.1145/2187836.2187880},
  doi       = {10.1145/2187836.2187880},
  timestamp = {Thu, 19 Apr 2012 14:34:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/www/BurszteinSBM12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/corr/abs-1202-4503,
  author    = {Arvind Narayanan and
               Vincent Toubiana and
               Solon Barocas and
               Helen Nissenbaum and
               Dan Boneh},
  title     = {A Critical Look at Decentralized Personal Data Architectures},
  journal   = {CoRR},
  volume    = {abs/1202.4503},
  year      = {2012},
  url       = {http://arxiv.org/abs/1202.4503},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/corr/abs-1202-4503},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/BonehZ12,
  author    = {Dan Boneh and
               Mark Zhandry},
  title     = {Quantum-Secure Message Authentication Codes},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {19},
  pages     = {136},
  year      = {2012},
  url       = {http://eccc.hpi-web.de/report/2012/136},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/eccc/BonehZ12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehZ12,
  author    = {Dan Boneh and
               Mark Zhandry},
  title     = {Quantum-Secure Message Authentication Codes},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2012},
  pages     = {606},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/606},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehZ12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/crossroads/Boneh11,
  author    = {Dan Boneh},
  title     = {Recent ideas for circumventing internet filtering},
  journal   = {{ACM} Crossroads},
  volume    = {18},
  number    = {2},
  pages     = {36--40},
  year      = {2011},
  url       = {http://doi.acm.org/10.1145/2043236.2043250},
  doi       = {10.1145/2043236.2043250},
  timestamp = {Thu, 01 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/crossroads/Boneh11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/BonehB11,
  author    = {Dan Boneh and
               Xavier Boyen},
  title     = {Efficient Selective Identity-Based Encryption Without Random Oracles},
  journal   = {J. Cryptology},
  volume    = {24},
  number    = {4},
  pages     = {659--693},
  year      = {2011},
  url       = {https://doi.org/10.1007/s00145-010-9078-6},
  doi       = {10.1007/s00145-010-9078-6},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/joc/BonehB11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehDFLSZ11,
  author    = {Dan Boneh and
               {\"{O}}zg{\"{u}}r Dagdelen and
               Marc Fischlin and
               Anja Lehmann and
               Christian Schaffner and
               Mark Zhandry},
  title     = {Random Oracles in a Quantum World},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  pages     = {41--69},
  year      = {2011},
  crossref  = {DBLP:conf/asiacrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0_3},
  doi       = {10.1007/978-3-642-25385-0_3},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BonehDFLSZ11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehF11,
  author    = {Dan Boneh and
               David Mandell Freeman},
  title     = {Homomorphic Signatures for Polynomial Functions},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tallinn, Estonia, May 15-19, 2011. Proceedings},
  pages     = {149--168},
  year      = {2011},
  crossref  = {DBLP:conf/eurocrypt/2011},
  url       = {https://doi.org/10.1007/978-3-642-20465-4_10},
  doi       = {10.1007/978-3-642-20465-4_10},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehF11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/NarayananTLHB11,
  author    = {Arvind Narayanan and
               Narendran Thiagarajan and
               Mugdha Lakhani and
               Michael Hamburg and
               Dan Boneh},
  title     = {Location Privacy via Private Proximity Testing},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
               2011},
  year      = {2011},
  crossref  = {DBLP:conf/ndss/2011},
  url       = {http://www.isoc.org/isoc/conferences/ndss/11/pdf/1_3.pdf},
  timestamp = {Wed, 31 Aug 2011 14:05:35 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/NarayananTLHB11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BonehF11,
  author    = {Dan Boneh and
               David Mandell Freeman},
  title     = {Linearly Homomorphic Signatures over Binary Fields and New Tools for
               Lattice-Based Signatures},
  booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
               on Practice and Theory in Public Key Cryptography, Taormina, Italy,
               March 6-9, 2011. Proceedings},
  pages     = {1--16},
  year      = {2011},
  crossref  = {DBLP:conf/pkc/2011},
  url       = {https://doi.org/10.1007/978-3-642-19379-8_1},
  doi       = {10.1007/978-3-642-19379-8_1},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pkc/BonehF11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sp/BurszteinHLB11,
  author    = {Elie Bursztein and
               Mike Hamburg and
               Jocelyn Lagarenne and
               Dan Boneh},
  title     = {OpenConflict: Preventing Real Time Map Hacks in Online Games},
  booktitle = {32nd {IEEE} Symposium on Security and Privacy, S{\&}P 2011, 22-25
               May 2011, Berkeley, California, {USA}},
  pages     = {506--520},
  year      = {2011},
  crossref  = {DBLP:conf/sp/2011},
  url       = {https://doi.org/10.1109/SP.2011.28},
  doi       = {10.1109/SP.2011.28},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/BurszteinHLB11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BonehSW11,
  author    = {Dan Boneh and
               Amit Sahai and
               Brent Waters},
  title     = {Functional Encryption: Definitions and Challenges},
  booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
               2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  pages     = {253--273},
  year      = {2011},
  crossref  = {DBLP:conf/tcc/2011},
  url       = {https://doi.org/10.1007/978-3-642-19571-6_16},
  doi       = {10.1007/978-3-642-19571-6_16},
  timestamp = {Tue, 13 Jun 2017 11:30:16 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/BonehSW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wisec/BojinovBCM11,
  author    = {Hristo Bojinov and
               Dan Boneh and
               Rich Cannings and
               Iliyan Malchev},
  title     = {Address space randomization for mobile devices},
  booktitle = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
               {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  pages     = {127--138},
  year      = {2011},
  crossref  = {DBLP:conf/wisec/2011},
  url       = {http://doi.acm.org/10.1145/1998412.1998434},
  doi       = {10.1145/1998412.1998434},
  timestamp = {Wed, 24 Aug 2011 20:02:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wisec/BojinovBCM11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wmcsa/BojinovB11,
  author    = {Hristo Bojinov and
               Dan Boneh},
  title     = {Mobile token-based authentication on a budget},
  booktitle = {12th Workshop on Mobile Computing Systems and Applications, HotMobile
               '11, Phoenix, AZ, USA, March 1-3, 2011},
  pages     = {14--19},
  year      = {2011},
  crossref  = {DBLP:conf/wmcsa/2011},
  url       = {http://doi.acm.org/10.1145/2184489.2184494},
  doi       = {10.1145/2184489.2184494},
  timestamp = {Wed, 30 Jul 2014 17:23:27 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wmcsa/BojinovB11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh11,
  author    = {Dan Boneh},
  title     = {Aggregate Signatures},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {27},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_139},
  doi       = {10.1007/978-1-4419-5906-5_139},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh11a,
  author    = {Dan Boneh},
  title     = {{BLS} Short Digital Signatures},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {158--159},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_140},
  doi       = {10.1007/978-1-4419-5906-5_140},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh11a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh11b,
  author    = {Dan Boneh},
  title     = {Blum-Blum-Shub Pseudorandom Bit Generator},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {160--161},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_141},
  doi       = {10.1007/978-1-4419-5906-5_141},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh11b},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh11c,
  author    = {Dan Boneh},
  title     = {Blum-Goldwasser Public Key Encryption System},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {161--162},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_142},
  doi       = {10.1007/978-1-4419-5906-5_142},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh11c},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh11d,
  author    = {Dan Boneh},
  title     = {Cramer-Shoup Public-Key System},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {269--270},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_144},
  doi       = {10.1007/978-1-4419-5906-5_144},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh11d},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh11e,
  author    = {Dan Boneh},
  title     = {Digital Signature Standard},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {347},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_145},
  doi       = {10.1007/978-1-4419-5906-5_145},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh11e},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh11f,
  author    = {Dan Boneh},
  title     = {ElGamal Digital Signature Scheme},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {395--396},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_147},
  doi       = {10.1007/978-1-4419-5906-5_147},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh11f},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh11g,
  author    = {Dan Boneh},
  title     = {Rabin Digital Signature Scheme},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {1014--1015},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_152},
  doi       = {10.1007/978-1-4419-5906-5_152},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh11g},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh11h,
  author    = {Dan Boneh},
  title     = {Schnorr Digital Signature Scheme},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {1082--1083},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_154},
  doi       = {10.1007/978-1-4419-5906-5_154},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh11h},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh11i,
  author    = {Dan Boneh},
  title     = {Secure Signatures from the "Strong RSA" Assumption},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {1134--1135},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_155},
  doi       = {10.1007/978-1-4419-5906-5_155},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh11i},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh11j,
  author    = {Dan Boneh},
  title     = {Strong {RSA} Assumption},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  pages     = {1266},
  year      = {2011},
  crossref  = {DBLP:reference/crypt/2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5_157},
  doi       = {10.1007/978-1-4419-5906-5_157},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh11j},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehF11,
  author    = {Dan Boneh and
               David Mandell Freeman},
  title     = {Homomorphic Signatures for Polynomial Functions},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {18},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/018},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehF11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AhnBCHSW11,
  author    = {Jae Hyun Ahn and
               Dan Boneh and
               Jan Camenisch and
               Susan Hohenberger and
               Abhi Shelat and
               Brent Waters},
  title     = {Computing on Authenticated Data},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {96},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/096},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/AhnBCHSW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehSW11,
  author    = {Dan Boneh and
               Gil Segev and
               Brent Waters},
  title     = {Targeted Malleability: Homomorphic Encryption for Restricted Computations},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2011},
  pages     = {311},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/311},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehSW11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cacm/BojinovBB10,
  author    = {Hristo Bojinov and
               Elie Bursztein and
               Dan Boneh},
  title     = {The emergence of cross channel scripting},
  journal   = {Commun. {ACM}},
  volume    = {53},
  number    = {8},
  pages     = {105--113},
  year      = {2010},
  url       = {http://doi.acm.org/10.1145/1787234.1787257},
  doi       = {10.1145/1787234.1787257},
  timestamp = {Tue, 10 Aug 2010 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cacm/BojinovBB10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/sensors/QiuBLE10,
  author    = {Di Qiu and
               Dan Boneh and
               Sherman C. Lo and
               Per K. Enge},
  title     = {Reliable Location-Based Services from Radio Navigation Systems},
  journal   = {Sensors},
  volume    = {10},
  number    = {12},
  pages     = {11369--11389},
  year      = {2010},
  url       = {https://doi.org/10.3390/s101211369},
  doi       = {10.3390/s101211369},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/sensors/QiuBLE10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BonehMR10,
  author    = {Dan Boneh and
               Hart William Montgomery and
               Ananth Raghunathan},
  title     = {Algebraic pseudorandom functions with improved efficiency from the
               augmented cascade},
  booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages     = {131--140},
  year      = {2010},
  crossref  = {DBLP:conf/ccs/2010},
  url       = {http://doi.acm.org/10.1145/1866307.1866323},
  doi       = {10.1145/1866307.1866323},
  timestamp = {Mon, 22 Nov 2010 20:51:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BonehMR10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalBB10,
  author    = {Shweta Agrawal and
               Dan Boneh and
               Xavier Boyen},
  title     = {Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext
               Hierarchical {IBE}},
  booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  pages     = {98--115},
  year      = {2010},
  crossref  = {DBLP:conf/crypto/2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7_6},
  doi       = {10.1007/978-3-642-14623-7_6},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/AgrawalBB10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/drm/BonehKM10,
  author    = {Dan Boneh and
               Aggelos Kiayias and
               Hart William Montgomery},
  title     = {Robust fingerprinting codes: a near optimal construction},
  booktitle = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
               Chicago, Illinois, USA, October 4, 2010},
  pages     = {3--12},
  year      = {2010},
  crossref  = {DBLP:conf/drm/2010},
  url       = {http://doi.acm.org/10.1145/1866870.1866873},
  doi       = {10.1145/1866870.1866873},
  timestamp = {Wed, 28 Mar 2012 12:54:32 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/drm/BonehKM10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BojinovBBB10,
  author    = {Hristo Bojinov and
               Elie Bursztein and
               Xavier Boyen and
               Dan Boneh},
  title     = {Kamouflage: Loss-Resistant Password Management},
  booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
               in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  pages     = {286--302},
  year      = {2010},
  crossref  = {DBLP:conf/esorics/2010},
  url       = {https://doi.org/10.1007/978-3-642-15497-3_18},
  doi       = {10.1007/978-3-642-15497-3_18},
  timestamp = {Thu, 15 Jun 2017 21:35:50 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/esorics/BojinovBBB10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgrawalBB10,
  author    = {Shweta Agrawal and
               Dan Boneh and
               Xavier Boyen},
  title     = {Efficient Lattice {(H)IBE} in the Standard Model},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               French Riviera, May 30 - June 3, 2010. Proceedings},
  pages     = {553--572},
  year      = {2010},
  crossref  = {DBLP:conf/eurocrypt/2010},
  url       = {https://doi.org/10.1007/978-3-642-13190-5_28},
  doi       = {10.1007/978-3-642-13190-5_28},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/AgrawalBB10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/mobicase/DodsonSBL10,
  author    = {Ben Dodson and
               Debangsu Sengupta and
               Dan Boneh and
               Monica S. Lam},
  title     = {Secure, Consumer-Friendly Web Authentication and Payments with a Phone},
  booktitle = {Mobile Computing, Applications, and Services - Second International
               {ICST} Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28,
               2010, Revised Selected Papers},
  pages     = {17--38},
  year      = {2010},
  crossref  = {DBLP:conf/mobicase/2010},
  url       = {https://doi.org/10.1007/978-3-642-29336-8_2},
  doi       = {10.1007/978-3-642-29336-8_2},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/mobicase/DodsonSBL10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ToubianaNBNB10,
  author    = {Vincent Toubiana and
               Arvind Narayanan and
               Dan Boneh and
               Helen Nissenbaum and
               Solon Barocas},
  title     = {Adnostic: Privacy Preserving Targeted Advertising},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
               2010},
  year      = {2010},
  crossref  = {DBLP:conf/ndss/2010},
  url       = {http://www.isoc.org/isoc/conferences/ndss/10/pdf/05.pdf},
  timestamp = {Wed, 31 Aug 2011 13:59:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/ToubianaNBNB10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalBBF10,
  author    = {Shweta Agrawal and
               Dan Boneh and
               Xavier Boyen and
               David Mandell Freeman},
  title     = {Preventing Pollution Attacks in Multi-source Network Coding},
  booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference
               on Practice and Theory in Public Key Cryptography, Paris, France,
               May 26-28, 2010. Proceedings},
  pages     = {161--176},
  year      = {2010},
  crossref  = {DBLP:conf/pkc/2010},
  url       = {https://doi.org/10.1007/978-3-642-13013-7_10},
  doi       = {10.1007/978-3-642-13013-7_10},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pkc/AgrawalBBF10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/AggarwalBJB10,
  author    = {Gaurav Aggarwal and
               Elie Bursztein and
               Collin Jackson and
               Dan Boneh},
  title     = {An Analysis of Private Browsing Modes in Modern Browsers},
  booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
               2010, Proceedings},
  pages     = {79--94},
  year      = {2010},
  crossref  = {DBLP:conf/uss/2010},
  url       = {http://www.usenix.org/events/sec10/tech/full_papers/Aggarwal.pdf},
  timestamp = {Wed, 14 May 2014 19:33:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/AggarwalBJB10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/BittauHHMB10,
  author    = {Andrea Bittau and
               Michael Hamburg and
               Mark Handley and
               David Mazi{\`{e}}res and
               Dan Boneh},
  title     = {The Case for Ubiquitous Transport-Level Encryption},
  booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
               2010, Proceedings},
  pages     = {403--418},
  year      = {2010},
  crossref  = {DBLP:conf/uss/2010},
  url       = {http://www.usenix.org/events/sec10/tech/full_papers/Bittau.pdf},
  timestamp = {Wed, 14 May 2014 19:33:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/BittauHHMB10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/BurszteinGFBRBBM10,
  author    = {Elie Bursztein and
               Baptiste Gourdin and
               Celine Fabry and
               Jason Bau and
               Gustav Rydstedt and
               Hristo Bojinov and
               Dan Boneh and
               John C. Mitchell},
  title     = {Webseclab Security Education Workbench},
  booktitle = {3rd Workshop on Cyber Security Experimentation and Test, {CSET} '10,
               Washington, D.C., USA, August 9, 2010},
  year      = {2010},
  crossref  = {DBLP:conf/uss/2010cset},
  url       = {https://www.usenix.org/conference/cset10/webseclab-security-education-workbench},
  timestamp = {Tue, 20 May 2014 12:28:08 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/BurszteinGFBRBBM10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBBF10,
  author    = {Shweta Agrawal and
               Dan Boneh and
               Xavier Boyen and
               David Mandell Freeman},
  title     = {Preventing Pollution Attacks in Multi-Source Network Coding},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {183},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/183},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/AgrawalBBF10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehDFLSZ10,
  author    = {Dan Boneh and
               {\"{O}}zg{\"{u}}r Dagdelen and
               Marc Fischlin and
               Anja Lehmann and
               Christian Schaffner and
               Mark Zhandry},
  title     = {Random Oracles in a Quantum World},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {428},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/428},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehDFLSZ10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehMR10,
  author    = {Dan Boneh and
               Hart William Montgomery and
               Ananth Raghunathan},
  title     = {Algebraic Pseudorandom Functions with Improved Efficiency from the
               Augmented Cascade},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {442},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/442},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehMR10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehF10,
  author    = {Dan Boneh and
               David Mandell Freeman},
  title     = {Linearly Homomorphic Signatures over Binary Fields and New Tools for
               Lattice-Based Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {453},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/453},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehF10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehSW10,
  author    = {Dan Boneh and
               Amit Sahai and
               Brent Waters},
  title     = {Functional Encryption: Definitions and Challenges},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2010},
  pages     = {543},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/543},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehSW10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tweb/JacksonBBSB09,
  author    = {Collin Jackson and
               Adam Barth and
               Andrew Bortz and
               Weidong Shao and
               Dan Boneh},
  title     = {Protecting browsers from {DNS} rebinding attacks},
  journal   = {{TWEB}},
  volume    = {3},
  number    = {1},
  pages     = {2:1--2:26},
  year      = {2009},
  url       = {http://doi.acm.org/10.1145/1462148.1462150},
  doi       = {10.1145/1462148.1462150},
  timestamp = {Wed, 04 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tweb/JacksonBBSB09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acns/AgrawalB09,
  author    = {Shweta Agrawal and
               Dan Boneh},
  title     = {Homomorphic MACs: MAC-Based Integrity for Network Coding},
  booktitle = {Applied Cryptography and Network Security, 7th International Conference,
               {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  pages     = {292--305},
  year      = {2009},
  crossref  = {DBLP:conf/acns/2009},
  url       = {https://doi.org/10.1007/978-3-642-01957-9_18},
  doi       = {10.1007/978-3-642-01957-9_18},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/AgrawalB09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StarkHB09,
  author    = {Emily Stark and
               Michael Hamburg and
               Dan Boneh},
  title     = {Symmetric Cryptography in Javascript},
  booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
               2009, Honolulu, Hawaii, 7-11 December 2009},
  pages     = {373--381},
  year      = {2009},
  crossref  = {DBLP:conf/acsac/2009},
  url       = {https://doi.org/10.1109/ACSAC.2009.42},
  doi       = {10.1109/ACSAC.2009.42},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acsac/StarkHB09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BojinovBB09,
  author    = {Hristo Bojinov and
               Elie Bursztein and
               Dan Boneh},
  title     = {{XCS:} cross channel scripting and its impact on web applications},
  booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages     = {420--431},
  year      = {2009},
  crossref  = {DBLP:conf/ccs/2009},
  url       = {http://doi.acm.org/10.1145/1653662.1653713},
  doi       = {10.1145/1653662.1653713},
  timestamp = {Wed, 25 Nov 2009 10:26:38 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BojinovBB09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BonehFKW09,
  author    = {Dan Boneh and
               David Mandell Freeman and
               Jonathan Katz and
               Brent Waters},
  title     = {Signing a Linear Subspace: Signature Schemes for Network Coding},
  booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  pages     = {68--87},
  year      = {2009},
  crossref  = {DBLP:conf/pkc/2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1_5},
  doi       = {10.1007/978-3-642-00468-1_5},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pkc/BonehFKW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2009P9141,
  editor    = {Dan Boneh and
               {\'{U}}lfar Erlingsson and
               Martin Johns and
               Benjamin Livshits},
  title     = {Web Application Security, 29.03. - 03.04.2009},
  series    = {Dagstuhl Seminar Proceedings},
  volume    = {09141},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year      = {2009},
  url       = {http://drops.dagstuhl.de/portals/09141/},
  timestamp = {Wed, 08 Apr 2015 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dagstuhl/2009P9141},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BonehEJL09,
  author    = {Dan Boneh and
               {\'{U}}lfar Erlingsson and
               Martin Johns and
               Benjamin Livshits},
  title     = {09141 Abstracts Collection - Web Application Security},
  booktitle = {Web Application Security, 29.03. - 03.04.2009},
  year      = {2009},
  crossref  = {DBLP:conf/dagstuhl/2009P9141},
  url       = {http://drops.dagstuhl.de/opus/volltexte/2010/2726/},
  timestamp = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dagstuhl/BonehEJL09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BonehEJL09a,
  author    = {Dan Boneh and
               {\'{U}}lfar Erlingsson and
               Martin Johns and
               Benjamin Livshits},
  title     = {09141 Executive Summary - Web Application Security},
  booktitle = {Web Application Security, 29.03. - 03.04.2009},
  year      = {2009},
  crossref  = {DBLP:conf/dagstuhl/2009P9141},
  url       = {http://drops.dagstuhl.de/opus/volltexte/2010/2725/},
  timestamp = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dagstuhl/BonehEJL09a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehRS09,
  author    = {Dan Boneh and
               Karl Rubin and
               Alice Silverberg},
  title     = {Finding composite order ordinary elliptic curves using the Cocks-Pinch
               method},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2009},
  pages     = {533},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/533},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehRS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/BonehB08,
  author    = {Dan Boneh and
               Xavier Boyen},
  title     = {Short Signatures Without Random Oracles and the {SDH} Assumption in
               Bilinear Groups},
  journal   = {J. Cryptology},
  volume    = {21},
  number    = {2},
  pages     = {149--177},
  year      = {2008},
  url       = {https://doi.org/10.1007/s00145-007-9005-7},
  doi       = {10.1007/s00145-007-9005-7},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/joc/BonehB08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehH08,
  author    = {Dan Boneh and
               Michael Hamburg},
  title     = {Generalized Identity Based and Broadcast Encryption Schemes},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  pages     = {455--470},
  year      = {2008},
  crossref  = {DBLP:conf/asiacrypt/2008},
  url       = {https://doi.org/10.1007/978-3-540-89255-7_28},
  doi       = {10.1007/978-3-540-89255-7_28},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BonehH08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asplos/ChenGLSWBDP08,
  author    = {Xiaoxin Chen and
               Tal Garfinkel and
               E. Christopher Lewis and
               Pratap Subrahmanyam and
               Carl A. Waldspurger and
               Dan Boneh and
               Jeffrey S. Dwoskin and
               Dan R. K. Ports},
  title     = {Overshadow: a virtualization-based approach to retrofitting protection
               in commodity operating systems},
  booktitle = {Proceedings of the 13th International Conference on Architectural
               Support for Programming Languages and Operating Systems, {ASPLOS}
               2008, Seattle, WA, USA, March 1-5, 2008},
  pages     = {2--13},
  year      = {2008},
  crossref  = {DBLP:conf/asplos/2008},
  url       = {http://doi.acm.org/10.1145/1346281.1346284},
  doi       = {10.1145/1346281.1346284},
  timestamp = {Tue, 08 Apr 2008 14:29:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asplos/ChenGLSWBDP08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BonehN08,
  author    = {Dan Boneh and
               Moni Naor},
  title     = {Traitor tracing with constant size ciphertext},
  booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages     = {501--510},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008},
  url       = {http://doi.acm.org/10.1145/1455770.1455834},
  doi       = {10.1145/1455770.1455834},
  timestamp = {Tue, 11 Nov 2008 10:39:24 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BonehN08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehHHO08,
  author    = {Dan Boneh and
               Shai Halevi and
               Michael Hamburg and
               Rafail Ostrovsky},
  title     = {Circular-Secure Encryption from Decision Diffie-Hellman},
  booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
               Proceedings},
  pages     = {108--125},
  year      = {2008},
  crossref  = {DBLP:conf/crypto/2008},
  url       = {https://doi.org/10.1007/978-3-540-85174-5_7},
  doi       = {10.1007/978-3-540-85174-5_7},
  timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehHHO08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/BonehPRVW08,
  author    = {Dan Boneh and
               Periklis A. Papakonstantinou and
               Charles Rackoff and
               Yevgeniy Vahlis and
               Brent Waters},
  title     = {On the Impossibility of Basing Identity Based Encryption on Trapdoor
               Permutations},
  booktitle = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2008, October 25-28, 2008, Philadelphia, PA, {USA}},
  pages     = {283--292},
  year      = {2008},
  crossref  = {DBLP:conf/focs/2008},
  url       = {https://doi.org/10.1109/FOCS.2008.67},
  doi       = {10.1109/FOCS.2008.67},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/BonehPRVW08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2007P7381,
  editor    = {Johannes Bl{\"{o}}mer and
               Dan Boneh and
               Ronald Cramer and
               Ueli M. Maurer},
  title     = {Cryptography, 16.09. - 21.09.2007},
  series    = {Dagstuhl Seminar Proceedings},
  volume    = {07381},
  publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
               (IBFI), Schloss Dagstuhl, Germany},
  year      = {2008},
  url       = {http://drops.dagstuhl.de/portals/07381/},
  timestamp = {Wed, 19 Jun 2013 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dagstuhl/2007P7381},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2008woot,
  editor    = {Dan Boneh and
               Tal Garfinkel and
               Dug Song},
  title     = {2nd {USENIX} Workshop on Offensive Technologies, WOOT'08, San Jose,
               CA, USA, July 28, 2008, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2008},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A85},
  timestamp = {Tue, 13 May 2014 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2008woot},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehFKW08,
  author    = {Dan Boneh and
               David Mandell Freeman and
               Jonathan Katz and
               Brent Waters},
  title     = {Signing a Linear Subspace: Signature Schemes for Network Coding},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2008},
  pages     = {316},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/316},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehFKW08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/BonehCHK07,
  author    = {Dan Boneh and
               Ran Canetti and
               Shai Halevi and
               Jonathan Katz},
  title     = {Chosen-Ciphertext Security from Identity-Based Encryption},
  journal   = {{SIAM} J. Comput.},
  volume    = {36},
  number    = {5},
  pages     = {1301--1328},
  year      = {2007},
  url       = {https://doi.org/10.1137/S009753970544713X},
  doi       = {10.1137/S009753970544713X},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/siamcomp/BonehCHK07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaileyBGJ07,
  author    = {Daniel V. Bailey and
               Dan Boneh and
               Eu{-}Jin Goh and
               Ari Juels},
  title     = {Covert channels in privacy-preserving identification systems},
  booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
               Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages     = {297--306},
  year      = {2007},
  crossref  = {DBLP:conf/ccs/2007},
  url       = {http://doi.acm.org/10.1145/1315245.1315283},
  doi       = {10.1145/1315245.1315283},
  timestamp = {Fri, 22 Feb 2008 08:21:16 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BaileyBGJ07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JacksonBBSB07,
  author    = {Collin Jackson and
               Adam Barth and
               Andrew Bortz and
               Weidong Shao and
               Dan Boneh},
  title     = {Protecting browsers from dns rebinding attacks},
  booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
               Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages     = {421--431},
  year      = {2007},
  crossref  = {DBLP:conf/ccs/2007},
  url       = {http://doi.acm.org/10.1145/1315245.1315298},
  doi       = {10.1145/1315245.1315298},
  timestamp = {Fri, 22 Feb 2008 08:21:16 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/JacksonBBSB07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehKOS07,
  author    = {Dan Boneh and
               Eyal Kushilevitz and
               Rafail Ostrovsky and
               William E. Skeith III},
  title     = {Public Key Encryption That Allows {PIR} Queries},
  booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
               Proceedings},
  pages     = {50--67},
  year      = {2007},
  crossref  = {DBLP:conf/crypto/2007},
  url       = {https://doi.org/10.1007/978-3-540-74143-5_4},
  doi       = {10.1007/978-3-540-74143-5_4},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehKOS07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/Boneh07,
  author    = {Dan Boneh},
  title     = {A Brief Look at Pairings Based Cryptography},
  booktitle = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
               2007), October 20-23, 2007, Providence, RI, USA, Proceedings},
  pages     = {19--26},
  year      = {2007},
  crossref  = {DBLP:conf/focs/2007},
  url       = {https://doi.org/10.1109/FOCS.2007.5},
  doi       = {10.1109/FOCS.2007.5},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/Boneh07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/focs/BonehGH07,
  author    = {Dan Boneh and
               Craig Gentry and
               Michael Hamburg},
  title     = {Space-Efficient Identity Based Encryption Without Pairings},
  booktitle = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
               2007), October 20-23, 2007, Providence, RI, USA, Proceedings},
  pages     = {647--657},
  year      = {2007},
  crossref  = {DBLP:conf/focs/2007},
  url       = {https://doi.org/10.1109/FOCS.2007.64},
  doi       = {10.1109/FOCS.2007.64},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/BonehGH07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BethencourtBW07,
  author    = {John Bethencourt and
               Dan Boneh and
               Brent Waters},
  title     = {Cryptographic Methods for Storing Ballots on a Voting Machine},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
               2007},
  year      = {2007},
  crossref  = {DBLP:conf/ndss/2007},
  url       = {http://www.isoc.org/isoc/conferences/ndss/07/papers/cryptographic_methods_for_storing_ballots.pdf},
  timestamp = {Thu, 16 Apr 2009 21:25:40 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/BethencourtBW07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pairing/Boneh07,
  author    = {Dan Boneh},
  title     = {Bilinear Groups of Composite Order},
  booktitle = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
               Tokyo, Japan, July 2-4, 2007, Proceedings},
  pages     = {1},
  year      = {2007},
  crossref  = {DBLP:conf/pairing/2007},
  url       = {https://doi.org/10.1007/978-3-540-73489-5_1},
  doi       = {10.1007/978-3-540-73489-5_1},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pairing/Boneh07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/soups/KumarGBW07,
  author    = {Manu Kumar and
               Tal Garfinkel and
               Dan Boneh and
               Terry Winograd},
  title     = {Reducing shoulder-surfing by using gaze-based password entry},
  booktitle = {Proceedings of the 3rd Symposium on Usable Privacy and Security, {SOUPS}
               2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007},
  pages     = {13--19},
  year      = {2007},
  crossref  = {DBLP:conf/soups/2007},
  url       = {http://doi.acm.org/10.1145/1280680.1280683},
  doi       = {10.1145/1280680.1280683},
  timestamp = {Tue, 10 Jun 2008 10:25:18 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/soups/KumarGBW07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BonehW07,
  author    = {Dan Boneh and
               Brent Waters},
  title     = {Conjunctive, Subset, and Range Queries on Encrypted Data},
  booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
               2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  pages     = {535--554},
  year      = {2007},
  crossref  = {DBLP:conf/tcc/2007},
  url       = {https://doi.org/10.1007/978-3-540-70936-7_29},
  doi       = {10.1007/978-3-540-70936-7_29},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/BonehW07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/JacksonBM07,
  author    = {Collin Jackson and
               Dan Boneh and
               John C. Mitchell},
  title     = {Transaction Generators: Root Kits for Web},
  booktitle = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston,
               MA, USA, August 7, 2007},
  year      = {2007},
  crossref  = {DBLP:conf/uss/2007hotsec},
  url       = {https://www.usenix.org/conference/hotsec-07/transaction-generators-root-kits-web},
  timestamp = {Wed, 14 May 2014 20:55:38 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/JacksonBM07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/wpes/Saint-JeanJBF07,
  author    = {Felipe Saint{-}Jean and
               Aaron Johnson and
               Dan Boneh and
               Joan Feigenbaum},
  title     = {Private web search},
  booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages     = {84--90},
  year      = {2007},
  crossref  = {DBLP:conf/wpes/2007},
  url       = {http://doi.acm.org/10.1145/1314333.1314351},
  doi       = {10.1145/1314333.1314351},
  timestamp = {Mon, 07 Apr 2008 08:32:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wpes/Saint-JeanJBF07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/www/BortzB07,
  author    = {Andrew Bortz and
               Dan Boneh},
  title     = {Exposing private information by timing web applications},
  booktitle = {Proceedings of the 16th International Conference on World Wide Web,
               {WWW} 2007, Banff, Alberta, Canada, May 8-12, 2007},
  pages     = {621--628},
  year      = {2007},
  crossref  = {DBLP:conf/www/2007},
  url       = {http://doi.acm.org/10.1145/1242572.1242656},
  doi       = {10.1145/1242572.1242656},
  timestamp = {Wed, 22 Aug 2007 09:51:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/www/BortzB07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/woot/2007,
  editor    = {Dan Boneh and
               Tal Garfinkel and
               Dug Song},
  title     = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston,
               MA, USA, August 6, 2007},
  publisher = {{USENIX} Association},
  year      = {2007},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A112},
  timestamp = {Wed, 14 May 2014 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/woot/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BlomerBCM07,
  author    = {Johannes Bl{\"{o}}mer and
               Dan Boneh and
               Ronald Cramer and
               Ueli M. Maurer},
  title     = {07381 Executive Summary - Cryptography},
  booktitle = {Cryptography, 16.09. - 21.09.2007},
  year      = {2007},
  crossref  = {DBLP:conf/dagstuhl/2007P7381},
  url       = {http://drops.dagstuhl.de/opus/volltexte/2008/1292},
  timestamp = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dagstuhl/BlomerBCM07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BlomerBCM07a,
  author    = {Johannes Bl{\"{o}}mer and
               Dan Boneh and
               Ronald Cramer and
               Ueli M. Maurer},
  title     = {07381 Abstracts Collection -- Cryptography},
  booktitle = {Cryptography, 16.09. - 21.09.2007},
  year      = {2007},
  crossref  = {DBLP:conf/dagstuhl/2007P7381},
  url       = {http://drops.dagstuhl.de/opus/volltexte/2008/1293},
  timestamp = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dagstuhl/BlomerBCM07a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehKOS07,
  author    = {Dan Boneh and
               Eyal Kushilevitz and
               Rafail Ostrovsky and
               William E. Skeith III},
  title     = {Public Key Encryption that Allows {PIR} Queries},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {73},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/073},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehKOS07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehGH07,
  author    = {Dan Boneh and
               Craig Gentry and
               Michael Hamburg},
  title     = {Space-Efficient Identity Based Encryption Without Pairings},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2007},
  pages     = {177},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/177},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehGH07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BonehW06,
  author    = {Dan Boneh and
               Brent Waters},
  title     = {A fully collusion resistant broadcast, trace, and revoke system},
  booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications
               Security, {CCS} 2006, Alexandria, VA, USA, Ioctober 30 - November
               3, 2006},
  pages     = {211--220},
  year      = {2006},
  crossref  = {DBLP:conf/ccs/2006usa},
  url       = {http://doi.acm.org/10.1145/1180405.1180432},
  doi       = {10.1145/1180405.1180432},
  timestamp = {Mon, 11 Dec 2006 11:03:22 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BonehW06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KrugerJGB06,
  author    = {Louis Kruger and
               Somesh Jha and
               Eu{-}Jin Goh and
               Dan Boneh},
  title     = {Secure function evaluation with ordered binary decision diagrams},
  booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications
               Security, {CCS} 2006, Alexandria, VA, USA, Ioctober 30 - November
               3, 2006},
  pages     = {410--420},
  year      = {2006},
  crossref  = {DBLP:conf/ccs/2006usa},
  url       = {http://doi.acm.org/10.1145/1180405.1180455},
  doi       = {10.1145/1180405.1180455},
  timestamp = {Mon, 11 Dec 2006 11:03:22 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/KrugerJGB06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehB06,
  author    = {Dan Boneh and
               Xavier Boyen},
  title     = {On the Impossibility of Efficiently Combining Collision Resistant
               Hash Functions},
  booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2006, Proceedings},
  pages     = {570--583},
  year      = {2006},
  crossref  = {DBLP:conf/crypto/2006},
  url       = {https://doi.org/10.1007/11818175_34},
  doi       = {10.1007/11818175_34},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehB06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BonehBH06,
  author    = {Dan Boneh and
               Xavier Boyen and
               Shai Halevi},
  title     = {Chosen Ciphertext Secure Public Key Threshold Encryption Without Random
               Oracles},
  booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
               the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
               Proceedings},
  pages     = {226--243},
  year      = {2006},
  crossref  = {DBLP:conf/ctrsa/2006},
  url       = {https://doi.org/10.1007/11605805_15},
  doi       = {10.1007/11605805_15},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/BonehBH06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehSW06,
  author    = {Dan Boneh and
               Amit Sahai and
               Brent Waters},
  title     = {Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and
               Private Keys},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  pages     = {573--592},
  year      = {2006},
  crossref  = {DBLP:conf/eurocrypt/2006},
  url       = {https://doi.org/10.1007/11761679_34},
  doi       = {10.1007/11761679_34},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehSW06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/BarthBW06,
  author    = {Adam Barth and
               Dan Boneh and
               Brent Waters},
  title     = {Privacy in Encrypted Content Distribution Using Private Broadcast
               Encryption},
  booktitle = {Financial Cryptography and Data Security, 10th International Conference,
               {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
               Revised Selected Papers},
  pages     = {52--64},
  year      = {2006},
  crossref  = {DBLP:conf/fc/2006},
  url       = {https://doi.org/10.1007/11889663_4},
  doi       = {10.1007/11889663_4},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/BarthBW06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BonehSW06,
  author    = {Dan Boneh and
               Emily Shen and
               Brent Waters},
  title     = {Strongly Unforgeable Signatures Based on Computational Diffie-Hellman},
  booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference
               on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
               April 24-26, 2006, Proceedings},
  pages     = {229--240},
  year      = {2006},
  crossref  = {DBLP:conf/pkc/2006},
  url       = {https://doi.org/10.1007/11745853_15},
  doi       = {10.1007/11745853_15},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pkc/BonehSW06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/CasadoGAFBM06,
  author    = {Mart{\'{\i}}n Casado and
               Tal Garfinkel and
               Aditya Akella and
               Michael J. Freedman and
               Dan Boneh and
               Nick McKeown},
  title     = {{SANE:} {A} Protection Architecture for Enterprise Networks},
  booktitle = {Proceedings of the 15th {USENIX} Security Symposium, Vancouver, BC,
               Canada, July 31 - August 4, 2006},
  year      = {2006},
  crossref  = {DBLP:conf/uss/2006},
  url       = {https://www.usenix.org/conference/15th-usenix-security-symposium/sane-protection-architecture-enterprise-networks},
  timestamp = {Fri, 19 Aug 2016 15:38:03 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/CasadoGAFBM06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/www/JacksonBBM06a,
  author    = {Collin Jackson and
               Andrew Bortz and
               Dan Boneh and
               John C. Mitchell},
  title     = {Protecting browser state from web privacy attacks},
  booktitle = {Proceedings of the 15th international conference on World Wide Web,
               {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006},
  pages     = {737--744},
  year      = {2006},
  crossref  = {DBLP:conf/www/2006},
  url       = {http://doi.acm.org/10.1145/1135777.1135884},
  doi       = {10.1145/1135777.1135884},
  timestamp = {Mon, 17 Jul 2006 14:10:19 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/www/JacksonBBM06a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehSW06,
  author    = {Dan Boneh and
               Amit Sahai and
               Brent Waters},
  title     = {Fully Collusion Resistant Traitor Tracing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {45},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/045},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehSW06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehW06,
  author    = {Dan Boneh and
               Brent Waters},
  title     = {Conjunctive, Subset, and Range Queries on Encrypted Data},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {287},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/287},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehW06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehW06a,
  author    = {Dan Boneh and
               Brent Waters},
  title     = {A Fully Collusion Resistant Broadcast, Trace, and Revoke System},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2006},
  pages     = {298},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/298},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehW06a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/cn/BrumleyB05,
  author    = {David Brumley and
               Dan Boneh},
  title     = {Remote timing attacks are practical},
  journal   = {Computer Networks},
  volume    = {48},
  number    = {5},
  pages     = {701--716},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.comnet.2005.01.010},
  doi       = {10.1016/j.comnet.2005.01.010},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/cn/BrumleyB05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dc/LiDB05,
  author    = {Ninghui Li and
               Wenliang Du and
               Dan Boneh},
  title     = {Oblivious signature-based envelope},
  journal   = {Distributed Computing},
  volume    = {17},
  number    = {4},
  pages     = {293--302},
  year      = {2005},
  url       = {https://doi.org/10.1007/s00446-004-0116-1},
  doi       = {10.1007/s00446-004-0116-1},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dc/LiDB05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehGW05,
  author    = {Dan Boneh and
               Craig Gentry and
               Brent Waters},
  title     = {Collusion Resistant Broadcast Encryption with Short Ciphertexts and
               Private Keys},
  booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  pages     = {258--275},
  year      = {2005},
  crossref  = {DBLP:conf/crypto/2005},
  url       = {https://doi.org/10.1007/11535218_16},
  doi       = {10.1007/11535218_16},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehGW05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BonehK05,
  author    = {Dan Boneh and
               Jonathan Katz},
  title     = {Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based
               Encryption},
  booktitle = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
               the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
               2005, Proceedings},
  pages     = {87--103},
  year      = {2005},
  crossref  = {DBLP:conf/ctrsa/2005},
  url       = {https://doi.org/10.1007/978-3-540-30574-3_8},
  doi       = {10.1007/978-3-540-30574-3_8},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/BonehK05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehBG05,
  author    = {Dan Boneh and
               Xavier Boyen and
               Eu{-}Jin Goh},
  title     = {Hierarchical Identity Based Encryption with Constant Size Ciphertext},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Aarhus, Denmark, May 22-26, 2005, Proceedings},
  pages     = {440--456},
  year      = {2005},
  crossref  = {DBLP:conf/eurocrypt/2005},
  url       = {https://doi.org/10.1007/11426639_26},
  doi       = {10.1007/11426639_26},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehBG05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BonehGN05,
  author    = {Dan Boneh and
               Eu{-}Jin Goh and
               Kobbi Nissim},
  title     = {Evaluating 2-DNF Formulas on Ciphertexts},
  booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference,
               {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  pages     = {325--341},
  year      = {2005},
  crossref  = {DBLP:conf/tcc/2005},
  url       = {https://doi.org/10.1007/978-3-540-30576-7_18},
  doi       = {10.1007/978-3-540-30576-7_18},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/BonehGN05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/RossJMBM05,
  author    = {Blake Ross and
               Collin Jackson and
               Nick Miyake and
               Dan Boneh and
               John C. Mitchell},
  title     = {Stronger Password Authentication Using Browser Extensions},
  booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
               USA, July 31 - August 5, 2005},
  year      = {2005},
  crossref  = {DBLP:conf/uss/2005},
  url       = {https://www.usenix.org/conference/14th-usenix-security-symposium/stronger-password-authentication-using-browser-extensions},
  timestamp = {Thu, 17 Nov 2016 19:38:24 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/RossJMBM05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh05,
  author    = {Dan Boneh},
  title     = {{BLS} Short Digital Signatures},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_35},
  doi       = {10.1007/0-387-23483-7_35},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh05a,
  author    = {Dan Boneh},
  title     = {Blum-Blum-Shub Pseudorandom Bit Generator},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_37},
  doi       = {10.1007/0-387-23483-7_37},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh05a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh05b,
  author    = {Dan Boneh},
  title     = {Blum-Goldwasser Public Key Encryption System},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_38},
  doi       = {10.1007/0-387-23483-7_38},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh05b},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh05c,
  author    = {Dan Boneh},
  title     = {Cramer-Shoup Public Key System},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_84},
  doi       = {10.1007/0-387-23483-7_84},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh05c},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh05d,
  author    = {Dan Boneh},
  title     = {Digital Signature Standard},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_114},
  doi       = {10.1007/0-387-23483-7_114},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh05d},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh05e,
  author    = {Dan Boneh},
  title     = {Elgamal Digital Signature Scheme},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_128},
  doi       = {10.1007/0-387-23483-7_128},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh05e},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh05f,
  author    = {Dan Boneh},
  title     = {Rabin Digital Signature Scheme},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_340},
  doi       = {10.1007/0-387-23483-7_340},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh05f},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh05g,
  author    = {Dan Boneh},
  title     = {Schnorr Digital Signature Scheme},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_369},
  doi       = {10.1007/0-387-23483-7_369},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh05g},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh05h,
  author    = {Dan Boneh},
  title     = {Secure signatures from the "strong RSA" assumption},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_374},
  doi       = {10.1007/0-387-23483-7_374},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh05h},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/crypt/Boneh05i,
  author    = {Dan Boneh},
  title     = {Strong {RSA} Assumption},
  booktitle = {Encyclopedia of Cryptography and Security},
  year      = {2005},
  crossref  = {DBLP:reference/crypt/2005},
  url       = {https://doi.org/10.1007/0-387-23483-7_414},
  doi       = {10.1007/0-387-23483-7_414},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/Boneh05i},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehBG05,
  author    = {Dan Boneh and
               Xavier Boyen and
               Eu{-}Jin Goh},
  title     = {Hierarchical Identity Based Encryption with Constant Size Ciphertext},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {15},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/015},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehBG05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehGW05,
  author    = {Dan Boneh and
               Craig Gentry and
               Brent Waters},
  title     = {Collusion Resistant Broadcast Encryption With Short Ciphertexts and
               Private Keys},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2005},
  pages     = {18},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/018},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehGW05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/debu/BonehFSW04,
  author    = {Dan Boneh and
               Joan Feigenbaum and
               Abraham Silberschatz and
               Rebecca N. Wright},
  title     = {{PORTIA:} Privacy, Obligations, and Rights in Technologies of Information
               Assessment},
  journal   = {{IEEE} Data Eng. Bull.},
  volume    = {27},
  number    = {1},
  pages     = {10--18},
  year      = {2004},
  url       = {ftp://ftp.research.microsoft.com/pub/debull/A04mar/avi.ps},
  timestamp = {Thu, 25 Aug 2005 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/debu/BonehFSW04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/BonehLS04,
  author    = {Dan Boneh and
               Ben Lynn and
               Hovav Shacham},
  title     = {Short Signatures from the Weil Pairing},
  journal   = {J. Cryptology},
  volume    = {17},
  number    = {4},
  pages     = {297--319},
  year      = {2004},
  url       = {https://doi.org/10.1007/s00145-004-0314-9},
  doi       = {10.1007/s00145-004-0314-9},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/joc/BonehLS04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tissec/ShachamBR04,
  author    = {Hovav Shacham and
               Dan Boneh and
               Eric Rescorla},
  title     = {Client-side caching for {TLS}},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {7},
  number    = {4},
  pages     = {553--575},
  year      = {2004},
  url       = {http://doi.acm.org/10.1145/1042031.1042034},
  doi       = {10.1145/1042031.1042034},
  timestamp = {Thu, 09 Feb 2006 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tissec/ShachamBR04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/toit/BonehDT04,
  author    = {Dan Boneh and
               Xuhua Ding and
               Gene Tsudik},
  title     = {Fine-grained control of security capabilities},
  journal   = {{ACM} Trans. Internet Techn.},
  volume    = {4},
  number    = {1},
  pages     = {60--82},
  year      = {2004},
  url       = {http://doi.acm.org/10.1145/967030.967033},
  doi       = {10.1145/967030.967033},
  timestamp = {Thu, 09 Feb 2006 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/toit/BonehDT04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BonehS04,
  author    = {Dan Boneh and
               Hovav Shacham},
  title     = {Group signatures with verifier-local revocation},
  booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications
               Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages     = {168--177},
  year      = {2004},
  crossref  = {DBLP:conf/ccs/2004ccs},
  url       = {http://doi.acm.org/10.1145/1030083.1030106},
  doi       = {10.1145/1030083.1030106},
  timestamp = {Thu, 17 Nov 2016 19:38:29 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BonehS04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShachamPPGMB04,
  author    = {Hovav Shacham and
               Matthew Page and
               Ben Pfaff and
               Eu{-}Jin Goh and
               Nagendra Modadugu and
               Dan Boneh},
  title     = {On the effectiveness of address-space randomization},
  booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications
               Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages     = {298--307},
  year      = {2004},
  crossref  = {DBLP:conf/ccs/2004ccs},
  url       = {http://doi.acm.org/10.1145/1030083.1030124},
  doi       = {10.1145/1030083.1030124},
  timestamp = {Thu, 17 Nov 2016 19:38:29 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/ShachamPPGMB04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehBS04,
  author    = {Dan Boneh and
               Xavier Boyen and
               Hovav Shacham},
  title     = {Short Group Signatures},
  booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
               CryptologyConference, Santa Barbara, California, USA, August 15-19,
               2004, Proceedings},
  pages     = {41--55},
  year      = {2004},
  crossref  = {DBLP:conf/crypto/2004},
  url       = {https://doi.org/10.1007/978-3-540-28628-8_3},
  doi       = {10.1007/978-3-540-28628-8_3},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehBS04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehB04,
  author    = {Dan Boneh and
               Xavier Boyen},
  title     = {Secure Identity Based Encryption Without Random Oracles},
  booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
               CryptologyConference, Santa Barbara, California, USA, August 15-19,
               2004, Proceedings},
  pages     = {443--459},
  year      = {2004},
  crossref  = {DBLP:conf/crypto/2004},
  url       = {https://doi.org/10.1007/978-3-540-28628-8_27},
  doi       = {10.1007/978-3-540-28628-8_27},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehB04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehB04,
  author    = {Dan Boneh and
               Xavier Boyen},
  title     = {Short Signatures Without Random Oracles},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
               on the Theory and Applications of Cryptographic Techniques, Interlaken,
               Switzerland, May 2-6, 2004, Proceedings},
  pages     = {56--73},
  year      = {2004},
  crossref  = {DBLP:conf/eurocrypt/2004},
  url       = {https://doi.org/10.1007/978-3-540-24676-3_4},
  doi       = {10.1007/978-3-540-24676-3_4},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehB04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehB04a,
  author    = {Dan Boneh and
               Xavier Boyen},
  title     = {Efficient Selective-ID Secure Identity-Based Encryption Without Random
               Oracles},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
               on the Theory and Applications of Cryptographic Techniques, Interlaken,
               Switzerland, May 2-6, 2004, Proceedings},
  pages     = {223--238},
  year      = {2004},
  crossref  = {DBLP:conf/eurocrypt/2004},
  url       = {https://doi.org/10.1007/978-3-540-24676-3_14},
  doi       = {10.1007/978-3-540-24676-3_14},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehB04a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehCOP04,
  author    = {Dan Boneh and
               Giovanni Di Crescenzo and
               Rafail Ostrovsky and
               Giuseppe Persiano},
  title     = {Public Key Encryption with Keyword Search},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
               on the Theory and Applications of Cryptographic Techniques, Interlaken,
               Switzerland, May 2-6, 2004, Proceedings},
  pages     = {506--522},
  year      = {2004},
  crossref  = {DBLP:conf/eurocrypt/2004},
  url       = {https://doi.org/10.1007/978-3-540-24676-3_30},
  doi       = {10.1007/978-3-540-24676-3_30},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehCOP04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehB04,
  author    = {Dan Boneh and
               Xavier Boyen},
  title     = {Short Signatures Without Random Oracles},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {171},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/171},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehB04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehB04a,
  author    = {Dan Boneh and
               Xavier Boyen},
  title     = {Efficient Selective-ID Secure Identity Based Encryption Without Random
               Oracles},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {172},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/172},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehB04a},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehB04b,
  author    = {Dan Boneh and
               Xavier Boyen},
  title     = {Secure Identity Based Encryption Without Random Oracles},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {173},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/173},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehB04b},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehBS04,
  author    = {Dan Boneh and
               Xavier Boyen and
               Hovav Shacham},
  title     = {Short Group Signatures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {174},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/174},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehBS04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehK04,
  author    = {Dan Boneh and
               Jonathan Katz},
  title     = {Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based
               Encryption},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2004},
  pages     = {261},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/261},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehK04},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/siamcomp/BonehF03,
  author    = {Dan Boneh and
               Matthew K. Franklin},
  title     = {Identity-Based Encryption from the Weil Pairing},
  journal   = {{SIAM} J. Comput.},
  volume    = {32},
  number    = {3},
  pages     = {586--615},
  year      = {2003},
  url       = {https://doi.org/10.1137/S0097539701398521},
  doi       = {10.1137/S0097539701398521},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/siamcomp/BonehF03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BonehMS03,
  author    = {Dan Boneh and
               Ilya Mironov and
               Victor Shoup},
  title     = {A Secure Signature Scheme from Bilinear Maps},
  booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
               the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
               Proceedings},
  pages     = {98--110},
  year      = {2003},
  crossref  = {DBLP:conf/ctrsa/2003},
  url       = {https://doi.org/10.1007/3-540-36563-X_7},
  doi       = {10.1007/3-540-36563-X_7},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/BonehMS03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehGLS03,
  author    = {Dan Boneh and
               Craig Gentry and
               Ben Lynn and
               Hovav Shacham},
  title     = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
               on the Theory and Applications of Cryptographic Techniques, Warsaw,
               Poland, May 4-8, 2003, Proceedings},
  pages     = {416--432},
  year      = {2003},
  crossref  = {DBLP:conf/eurocrypt/2003},
  url       = {https://doi.org/10.1007/3-540-39200-9_26},
  doi       = {10.1007/3-540-39200-9_26},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehGLS03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/hotos/GarfinkelRB03,
  author    = {Tal Garfinkel and
               Mendel Rosenblum and
               Dan Boneh},
  title     = {Flexible {OS} Support and Applications for Trusted Computing},
  booktitle = {Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems,
               May 18-21, 2003, Lihue (Kauai), Hawaii, {USA}},
  pages     = {145--150},
  year      = {2003},
  crossref  = {DBLP:conf/hotos/2003},
  url       = {https://www.usenix.org/conference/hotos-ix/flexible-os-support-and-applications-trusted-computing},
  timestamp = {Mon, 19 May 2014 17:54:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/hotos/GarfinkelRB03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isw/GohBPG03,
  author    = {Eu{-}Jin Goh and
               Dan Boneh and
               Benny Pinkas and
               Philippe Golle},
  title     = {The Design and Implementation of Protocol-Based Hidden Key Recovery},
  booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
               UK, October 1-3, 2003, Proceedings},
  pages     = {165--179},
  year      = {2003},
  crossref  = {DBLP:conf/isw/2003},
  url       = {https://doi.org/10.1007/10958513_13},
  doi       = {10.1007/10958513_13},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/isw/GohBPG03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GohSMB03,
  author    = {Eu{-}Jin Goh and
               Hovav Shacham and
               Nagendra Modadugu and
               Dan Boneh},
  title     = {SiRiUS: Securing Remote Untrusted Storage},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2003, San Diego, California, {USA}},
  year      = {2003},
  crossref  = {DBLP:conf/ndss/2003},
  url       = {http://www.isoc.org/isoc/conferences/ndss/03/proceedings/papers/9.pdf},
  timestamp = {Thu, 23 Jun 2016 15:53:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/GohSMB03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/podc/LiDB03,
  author    = {Ninghui Li and
               Wenliang Du and
               Dan Boneh},
  title     = {Oblivious signature-based envelope},
  booktitle = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of
               Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July
               13-16, 2003},
  pages     = {182--189},
  year      = {2003},
  crossref  = {DBLP:conf/podc/2003},
  url       = {http://doi.acm.org/10.1145/872035.872061},
  doi       = {10.1145/872035.872061},
  timestamp = {Wed, 23 May 2012 14:26:09 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/podc/LiDB03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/sosp/GarfinkelPCRB03,
  author    = {Tal Garfinkel and
               Ben Pfaff and
               Jim Chow and
               Mendel Rosenblum and
               Dan Boneh},
  title     = {Terra: a virtual machine-based platform for trusted computing},
  booktitle = {Proceedings of the 19th {ACM} Symposium on Operating Systems Principles
               2003, {SOSP} 2003, Bolton Landing, NY, USA, October 19-22, 2003},
  pages     = {193--206},
  year      = {2003},
  crossref  = {DBLP:conf/sosp/2003},
  url       = {http://doi.acm.org/10.1145/945445.945464},
  doi       = {10.1145/945445.945464},
  timestamp = {Mon, 22 Jun 2015 17:24:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sosp/GarfinkelPCRB03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/BrumleyB03,
  author    = {David Brumley and
               Dan Boneh},
  title     = {Remote Timing Attacks Are Practical},
  booktitle = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C.,
               USA, August 4-8, 2003},
  year      = {2003},
  crossref  = {DBLP:conf/uss/2003},
  url       = {https://www.usenix.org/conference/12th-usenix-security-symposium/remote-timing-attacks-are-practical},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/BrumleyB03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2003,
  editor    = {Dan Boneh},
  title     = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 17-21,
               2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2729},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b11817},
  doi       = {10.1007/b11817},
  isbn      = {3-540-40674-3},
  timestamp = {Mon, 29 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehCOP03,
  author    = {Dan Boneh and
               Giovanni Di Crescenzo and
               Rafail Ostrovsky and
               Giuseppe Persiano},
  title     = {Public Key Encryption with keyword Search},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2003},
  pages     = {195},
  year      = {2003},
  url       = {http://eprint.iacr.org/2003/195},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehCOP03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jcss/Boneh02,
  author    = {Dan Boneh},
  title     = {Finding Smooth Integers in Short Intervals Using {CRT} Decoding},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {64},
  number    = {4},
  pages     = {768--784},
  year      = {2002},
  url       = {https://doi.org/10.1006/jcss.2002.1827},
  doi       = {10.1006/jcss.2002.1827},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jcss/Boneh02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GolleZBJJ02,
  author    = {Philippe Golle and
               Sheng Zhong and
               Dan Boneh and
               Markus Jakobsson and
               Ari Juels},
  title     = {Optimistic Mixing for Exit-Polls},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  pages     = {451--465},
  year      = {2002},
  crossref  = {DBLP:conf/asiacrypt/2002},
  url       = {https://doi.org/10.1007/3-540-36178-2_28},
  doi       = {10.1007/3-540-36178-2_28},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/GolleZBJJ02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JacobBF02,
  author    = {Matthias Jacob and
               Dan Boneh and
               Edward W. Felten},
  title     = {Attacking an Obfuscated Cipher by Injecting Faults},
  booktitle = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
               {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  pages     = {16--31},
  year      = {2002},
  crossref  = {DBLP:conf/ccs/2002drm},
  url       = {https://doi.org/10.1007/978-3-540-44993-5_2},
  doi       = {10.1007/978-3-540-44993-5_2},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/JacobBF02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BonehG02,
  author    = {Dan Boneh and
               Philippe Golle},
  title     = {Almost entirely correct mixing with applications to voting},
  booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications
               Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages     = {68--77},
  year      = {2002},
  crossref  = {DBLP:conf/ccs/2002},
  url       = {http://doi.acm.org/10.1145/586110.586121},
  doi       = {10.1145/586110.586121},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BonehG02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ShachamB02,
  author    = {Hovav Shacham and
               Dan Boneh},
  title     = {Fast-Track Session Establishment for {TLS}},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2002, San Diego, California, {USA}},
  year      = {2002},
  crossref  = {DBLP:conf/ndss/2002},
  url       = {http://www.isoc.org/isoc/conferences/ndss/02/proceedings/papers/shacha.ps},
  timestamp = {Wed, 15 Dec 2004 13:45:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/ShachamB02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2002,
  editor    = {Dan Boneh},
  title     = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
               CA, USA, August 5-9, 2002},
  publisher = {{USENIX}},
  year      = {2002},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A195},
  isbn      = {1-931971-00-5},
  timestamp = {Wed, 14 May 2014 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehS02,
  author    = {Dan Boneh and
               Alice Silverberg},
  title     = {Applications of Multilinear Forms to Cryptography},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {80},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/080},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehS02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehGLS02,
  author    = {Dan Boneh and
               Craig Gentry and
               Ben Lynn and
               Hovav Shacham},
  title     = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2002},
  pages     = {175},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/175},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehGLS02},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ec/BaumBG01,
  author    = {Eric B. Baum and
               Dan Boneh and
               Charles Garrett},
  title     = {Where Genetic Algorithms Excel},
  journal   = {Evolutionary Computation},
  volume    = {9},
  number    = {1},
  pages     = {93--124},
  year      = {2001},
  url       = {https://doi.org/10.1162/10636560151075130},
  doi       = {10.1162/10636560151075130},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ec/BaumBG01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/jacm/BonehF01,
  author    = {Dan Boneh and
               Matthew K. Franklin},
  title     = {Efficient generation of shared {RSA} keys},
  journal   = {J. {ACM}},
  volume    = {48},
  number    = {4},
  pages     = {702--722},
  year      = {2001},
  url       = {http://doi.acm.org/10.1145/502090.502094},
  doi       = {10.1145/502090.502094},
  timestamp = {Thu, 20 Nov 2003 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/jacm/BonehF01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/joc/BonehDL01,
  author    = {Dan Boneh and
               Richard A. DeMillo and
               Richard J. Lipton},
  title     = {On the Importance of Eliminating Errors in Cryptographic Computations},
  journal   = {J. Cryptology},
  volume    = {14},
  number    = {2},
  pages     = {101--119},
  year      = {2001},
  url       = {https://doi.org/10.1007/s001450010016},
  doi       = {10.1007/s001450010016},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/joc/BonehDL01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehHH01,
  author    = {Dan Boneh and
               Shai Halevi and
               Nick Howgrave{-}Graham},
  title     = {The Modular Inversion Hidden Number Problem},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Gold Coast, Australia, December 9-13, 2001, Proceedings},
  pages     = {36--51},
  year      = {2001},
  crossref  = {DBLP:conf/asiacrypt/2001},
  url       = {https://doi.org/10.1007/3-540-45682-1_3},
  doi       = {10.1007/3-540-45682-1_3},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BonehHH01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehLS01,
  author    = {Dan Boneh and
               Ben Lynn and
               Hovav Shacham},
  title     = {Short Signatures from the Weil Pairing},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Gold Coast, Australia, December 9-13, 2001, Proceedings},
  pages     = {514--532},
  year      = {2001},
  crossref  = {DBLP:conf/asiacrypt/2001},
  url       = {https://doi.org/10.1007/3-540-45682-1_30},
  doi       = {10.1007/3-540-45682-1_30},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BonehLS01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehS01,
  author    = {Dan Boneh and
               Igor E. Shparlinski},
  title     = {On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman
               Scheme},
  booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  pages     = {201--212},
  year      = {2001},
  crossref  = {DBLP:conf/crypto/2001},
  url       = {https://doi.org/10.1007/3-540-44647-8_12},
  doi       = {10.1007/3-540-44647-8_12},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehS01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehF01,
  author    = {Dan Boneh and
               Matthew K. Franklin},
  title     = {Identity-Based Encryption from the Weil Pairing},
  booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  pages     = {213--229},
  year      = {2001},
  crossref  = {DBLP:conf/crypto/2001},
  url       = {https://doi.org/10.1007/3-540-44647-8_13},
  doi       = {10.1007/3-540-44647-8_13},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehF01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Boneh01,
  author    = {Dan Boneh},
  title     = {Simplified {OAEP} for the {RSA} and Rabin Functions},
  booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  pages     = {275--291},
  year      = {2001},
  crossref  = {DBLP:conf/crypto/2001},
  url       = {https://doi.org/10.1007/3-540-44647-8_17},
  doi       = {10.1007/3-540-44647-8_17},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/Boneh01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ShachamB01,
  author    = {Hovav Shacham and
               Dan Boneh},
  title     = {Improving {SSL} Handshake Performance via Batching},
  booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
               {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  pages     = {28--43},
  year      = {2001},
  crossref  = {DBLP:conf/ctrsa/2001},
  url       = {https://doi.org/10.1007/3-540-45353-9_3},
  doi       = {10.1007/3-540-45353-9_3},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/ShachamB01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehDF01,
  author    = {Dan Boneh and
               Glenn Durfee and
               Matthew K. Franklin},
  title     = {Lower Bounds for Multicast Message Authentication},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
               on the Theory and Application of Cryptographic Techniques, Innsbruck,
               Austria, May 6-10, 2001, Proceeding},
  pages     = {437--452},
  year      = {2001},
  crossref  = {DBLP:conf/eurocrypt/2001},
  url       = {https://doi.org/10.1007/3-540-44987-6_27},
  doi       = {10.1007/3-540-44987-6_27},
  timestamp = {Fri, 26 May 2017 14:09:16 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehDF01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/BonehDTW01,
  author    = {Dan Boneh and
               Xuhua Ding and
               Gene Tsudik and
               Chi{-}Ming Wong},
  title     = {A Method for Fast Revocation of Public Key Certificates and Security
               Capabilities},
  booktitle = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
               D.C., {USA}},
  year      = {2001},
  crossref  = {DBLP:conf/uss/2001},
  url       = {http://www.usenix.org/publications/library/proceedings/sec01/boneh.html},
  timestamp = {Wed, 14 May 2014 19:33:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/BonehDTW01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BonehF01,
  author    = {Dan Boneh and
               Matthew K. Franklin},
  title     = {Identity Based Encryption From the Weil Pairing},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2001},
  pages     = {90},
  year      = {2001},
  url       = {http://eprint.iacr.org/2001/090},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BonehF01},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/BonehD00,
  author    = {Dan Boneh and
               Glenn Durfee},
  title     = {Cryptanalysis of {RSA} with private key d less than N\({}^{\mbox{0.292}}\)},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {46},
  number    = {4},
  pages     = {1339--1349},
  year      = {2000},
  url       = {https://doi.org/10.1109/18.850673},
  doi       = {10.1109/18.850673},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tit/BonehD00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehJN00,
  author    = {Dan Boneh and
               Antoine Joux and
               Phong Q. Nguyen},
  title     = {Why Textbook ElGamal and {RSA} Encryption Are Insecure},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  pages     = {30--43},
  year      = {2000},
  crossref  = {DBLP:conf/asiacrypt/2000},
  url       = {https://doi.org/10.1007/3-540-44448-3_3},
  doi       = {10.1007/3-540-44448-3_3},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BonehJN00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asplos/LieTMLBMH00,
  author    = {David Lie and
               Chandramohan A. Thekkath and
               Mark Mitchell and
               Patrick Lincoln and
               Dan Boneh and
               John C. Mitchell and
               Mark Horowitz},
  title     = {Architectural Support for Copy and Tamper Resistant Software},
  booktitle = {{ASPLOS-IX} Proceedings of the 9th International Conference on Architectural
               Support for Programming Languages and Operating Systems, Cambridge,
               MA, USA, November 12-15, 2000.},
  pages     = {168--177},
  year      = {2000},
  crossref  = {DBLP:conf/asplos/2000},
  url       = {http://doi.acm.org/10.1145/356989.357005},
  doi       = {10.1145/356989.357005},
  timestamp = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asplos/LieTMLBMH00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehN00,
  author    = {Dan Boneh and
               Moni Naor},
  title     = {Timed Commitments},
  booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2000, Proceedings},
  pages     = {236--254},
  year      = {2000},
  crossref  = {DBLP:conf/crypto/2000},
  url       = {https://doi.org/10.1007/3-540-44598-6_15},
  doi       = {10.1007/3-540-44598-6_15},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehN00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BonehMK00,
  author    = {Dan Boneh and
               Nagendra Modadugu and
               Michael Kim},
  title     = {Generating {RSA} Keys on a Handheld Using an Untrusted Server},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
               in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  pages     = {271--282},
  year      = {2000},
  crossref  = {DBLP:conf/indocrypt/2000},
  url       = {https://doi.org/10.1007/3-540-44495-5_24},
  doi       = {10.1007/3-540-44495-5_24},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/BonehMK00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/stoc/Boneh00,
  author    = {Dan Boneh},
  title     = {Finding smooth integers in short intervals using {CRT} decoding},
  booktitle = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
               of Computing, May 21-23, 2000, Portland, OR, {USA}},
  pages     = {265--272},
  year      = {2000},
  crossref  = {DBLP:conf/stoc/2000},
  url       = {http://doi.acm.org/10.1145/335305.335337},
  doi       = {10.1145/335305.335337},
  timestamp = {Thu, 16 Feb 2012 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/Boneh00},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ipl/BihamBR99,
  author    = {Eli Biham and
               Dan Boneh and
               Omer Reingold},
  title     = {Breaking Generalized Diffie-Hellmann Modulo a Composite is no Easier
               Than Factoring},
  journal   = {Inf. Process. Lett.},
  volume    = {70},
  number    = {2},
  pages     = {83--87},
  year      = {1999},
  url       = {https://doi.org/10.1016/S0020-0190(99)00047-2},
  doi       = {10.1016/S0020-0190(99)00047-2},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/ipl/BihamBR99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BonehF99,
  author    = {Dan Boneh and
               Matthew K. Franklin},
  title     = {Anonymous Authentication with Subset Queries (extended abstract)},
  booktitle = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
               Communications Security, Singapore, November 1-4, 1999.},
  pages     = {113--119},
  year      = {1999},
  crossref  = {DBLP:conf/ccs/1999},
  url       = {http://doi.acm.org/10.1145/319709.319725},
  doi       = {10.1145/319709.319725},
  timestamp = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/BonehF99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehDH99,
  author    = {Dan Boneh and
               Glenn Durfee and
               Nick Howgrave{-}Graham},
  title     = {Factoring {N} = p\({}^{\mbox{r}}\)q for Large r},
  booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  pages     = {326--337},
  year      = {1999},
  crossref  = {DBLP:conf/crypto/1999},
  url       = {https://doi.org/10.1007/3-540-48405-1_21},
  doi       = {10.1007/3-540-48405-1_21},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehDH99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehF99,
  author    = {Dan Boneh and
               Matthew K. Franklin},
  title     = {An Efficient Public Key Traitor Tracing Scheme},
  booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  pages     = {338--353},
  year      = {1999},
  crossref  = {DBLP:conf/crypto/1999},
  url       = {https://doi.org/10.1007/3-540-48405-1_22},
  doi       = {10.1007/3-540-48405-1_22},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehF99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehD99,
  author    = {Dan Boneh and
               Glenn Durfee},
  title     = {Cryptanalysis of {RSA} with Private Key \emph{d} Less than \emph{N}\({}^{\mbox{0.292}}\)},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
               on the Theory and Application of Cryptographic Techniques, Prague,
               Czech Republic, May 2-6, 1999, Proceeding},
  pages     = {1--11},
  year      = {1999},
  crossref  = {DBLP:conf/eurocrypt/99},
  url       = {https://doi.org/10.1007/3-540-48910-X_1},
  doi       = {10.1007/3-540-48910-X_1},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehD99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/fc/DaswaniB99,
  author    = {Neil Daswani and
               Dan Boneh},
  title     = {Experimenting with Electronic Commerce on the PalmPilot},
  booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
               British West Indies, February 1999, Proceedings},
  pages     = {1--16},
  year      = {1999},
  crossref  = {DBLP:conf/fc/1999},
  url       = {https://doi.org/10.1007/3-540-48390-X_1},
  doi       = {10.1007/3-540-48390-X_1},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/DaswaniB99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MalkinWB99,
  author    = {Michael Malkin and
               Thomas D. Wu and
               Dan Boneh},
  title     = {Experimenting with Shared Generation of {RSA} Keys},
  booktitle = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 1999, San Diego, California, {USA}},
  year      = {1999},
  crossref  = {DBLP:conf/ndss/1999},
  url       = {http://www.isoc.org/isoc/conferences/ndss/99/proceedings/papers/malkin.pdf},
  timestamp = {Mon, 07 Feb 2005 15:56:32 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/MalkinWB99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/WuMB99,
  author    = {Thomas D. Wu and
               Michael Malkin and
               Dan Boneh},
  title     = {Building Intrusion-Tolerant Applications},
  booktitle = {Proceedings of the 8th {USENIX} Security Symposium, Washington, D.C.,
               August 23-26, 1999},
  year      = {1999},
  crossref  = {DBLP:conf/uss/1999},
  url       = {https://www.usenix.org/conference/8th-usenix-security-symposium/building-intrusion-tolerant-applications},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/WuMB99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tit/BonehS98,
  author    = {Dan Boneh and
               James Shaw},
  title     = {Collusion-Secure Fingerprinting for Digital Data},
  journal   = {{IEEE} Trans. Information Theory},
  volume    = {44},
  number    = {5},
  pages     = {1897--1905},
  year      = {1998},
  url       = {https://doi.org/10.1109/18.705568},
  doi       = {10.1109/18.705568},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/tit/BonehS98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ants/Boneh98,
  author    = {Dan Boneh},
  title     = {The Decision Diffie-Hellman Problem},
  booktitle = {Algorithmic Number Theory, Third International Symposium, ANTS-III,
               Portland, Oregon, USA, June 21-25, 1998, Proceedings},
  pages     = {48--63},
  year      = {1998},
  crossref  = {DBLP:conf/ants/1998},
  url       = {https://doi.org/10.1007/BFb0054851},
  doi       = {10.1007/BFb0054851},
  timestamp = {Tue, 23 May 2017 11:53:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ants/Boneh98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ants/BonehH98,
  author    = {Dan Boneh and
               Jeremy Horwitz},
  title     = {Generating a Product of Three Primes with an Unknown Factorization},
  booktitle = {Algorithmic Number Theory, Third International Symposium, ANTS-III,
               Portland, Oregon, USA, June 21-25, 1998, Proceedings},
  pages     = {237--251},
  year      = {1998},
  crossref  = {DBLP:conf/ants/1998},
  url       = {https://doi.org/10.1007/BFb0054866},
  doi       = {10.1007/BFb0054866},
  timestamp = {Tue, 23 May 2017 11:53:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ants/BonehH98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehDF98,
  author    = {Dan Boneh and
               Glenn Durfee and
               Yair Frankel},
  title     = {An Attack on {RSA} Given a Small Fraction of the Private Key Bits},
  booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Beijing, China, October 18-22, 1998, Proceedings},
  pages     = {25--34},
  year      = {1998},
  crossref  = {DBLP:conf/asiacrypt/1998},
  url       = {https://doi.org/10.1007/3-540-49649-1_3},
  doi       = {10.1007/3-540-49649-1_3},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/BonehDF98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehV98,
  author    = {Dan Boneh and
               Ramarathnam Venkatesan},
  title     = {Breaking {RSA} May Not Be Equivalent to Factoring},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
               on the Theory and Application of Cryptographic Techniques, Espoo,
               Finland, May 31 - June 4, 1998, Proceeding},
  pages     = {59--71},
  year      = {1998},
  crossref  = {DBLP:conf/eurocrypt/98},
  url       = {https://doi.org/10.1007/BFb0054117},
  doi       = {10.1007/BFb0054117},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehV98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uwec/DaswaniBGKP98,
  author    = {Neil Daswani and
               Dan Boneh and
               Hector Garcia{-}Molina and
               Steven P. Ketchpel and
               Andreas Paepcke},
  title     = {{SWAPEROO:} {A} Simple Wallet Architecture for Payments, Exchanges,
               Refunds, and Other Operations},
  booktitle = {Proceedings of the 3rd {USENIX} Workshop on Electronic Commerce, Boston,
               Massachusetts, USA, August 31 - September 3, 1998},
  year      = {1998},
  crossref  = {DBLP:conf/uwec/1998},
  url       = {https://www.usenix.org/conference/3rd-usenix-workshop-electronic-commerce/swaperoo-simple-wallet-architecture-payments},
  timestamp = {Tue, 27 May 2014 10:34:54 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uwec/DaswaniBGKP98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RubinBF97,
  author    = {Aviel D. Rubin and
               Dan Boneh and
               Kevin Fu},
  title     = {Revocation of Unread E-mail in an Untrusted Network},
  booktitle = {Information Security and Privacy, Second Australasian Conference,
               ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  pages     = {62--75},
  year      = {1997},
  crossref  = {DBLP:conf/acisp/1997},
  url       = {https://doi.org/10.1007/BFb0027944},
  doi       = {10.1007/BFb0027944},
  timestamp = {Mon, 22 May 2017 17:11:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/RubinBF97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehF97,
  author    = {Dan Boneh and
               Matthew K. Franklin},
  title     = {Efficient Generation of Shared {RSA} Keys (Extended Abstract)},
  booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  pages     = {425--439},
  year      = {1997},
  crossref  = {DBLP:conf/crypto/1997},
  url       = {https://doi.org/10.1007/BFb0052253},
  doi       = {10.1007/BFb0052253},
  timestamp = {Mon, 22 May 2017 17:11:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehF97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehDL97,
  author    = {Dan Boneh and
               Richard A. DeMillo and
               Richard J. Lipton},
  title     = {On the Importance of Checking Cryptographic Protocols for Faults (Extended
               Abstract)},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
               on the Theory and Application of Cryptographic Techniques, Konstanz,
               Germany, May 11-15, 1997, Proceeding},
  pages     = {37--51},
  year      = {1997},
  crossref  = {DBLP:conf/eurocrypt/97},
  url       = {https://doi.org/10.1007/3-540-69053-0_4},
  doi       = {10.1007/3-540-69053-0_4},
  timestamp = {Mon, 22 May 2017 17:12:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/BonehDL97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/istcs/BonehL97,
  author    = {Dan Boneh and
               Richard J. Lipton},
  title     = {Effect of Operators on Straight Line Complexity},
  booktitle = {Fifth Israel Symposium on Theory of Computing and Systems, {ISTCS}
               1997, Ramat-Gan, Israel, June 17-19, 1997, Proceedings},
  pages     = {1--5},
  year      = {1997},
  crossref  = {DBLP:conf/istcs/1997},
  url       = {https://doi.org/10.1109/ISTCS.1997.595151},
  doi       = {10.1109/ISTCS.1997.595151},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/istcs/BonehL97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/soda/BonehV97,
  author    = {Dan Boneh and
               Ramarathnam Venkatesan},
  title     = {Rounding in Lattices and its Cryptographic Applications},
  booktitle = {Proceedings of the Eighth Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, 5-7 January 1997, New Orleans, Louisiana.},
  pages     = {675--681},
  year      = {1997},
  crossref  = {DBLP:conf/soda/1997},
  url       = {http://dl.acm.org/citation.cfm?id=314161.314413},
  timestamp = {Fri, 07 Dec 2012 17:02:08 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/soda/BonehV97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR97-061,
  author    = {Eli Biham and
               Dan Boneh and
               Omer Reingold},
  title     = {Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring},
  journal   = {Electronic Colloquium on Computational Complexity {(ECCC)}},
  volume    = {4},
  number    = {61},
  year      = {1997},
  url       = {http://eccc.hpi-web.de/eccc-reports/1997/TR97-061/index.html},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/eccc/ECCC-TR97-061},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/iacr/BihamBR97,
  author    = {Eli Biham and
               Dan Boneh and
               Omer Reingold},
  title     = {Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {1997},
  pages     = {14},
  year      = {1997},
  url       = {http://eprint.iacr.org/1997/014},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/iacr/BihamBR97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/dam/BonehDLS96,
  author    = {Dan Boneh and
               Christopher Dunworth and
               Richard J. Lipton and
               Jir{\'{\i}} Sgall},
  title     = {On the Computational Power of {DNA}},
  journal   = {Discrete Applied Mathematics},
  volume    = {71},
  number    = {1-3},
  pages     = {79--94},
  year      = {1996},
  url       = {https://doi.org/10.1016/S0166-218X(96)00058-3},
  doi       = {10.1016/S0166-218X(96)00058-3},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/journals/dam/BonehDLS96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehV96,
  author    = {Dan Boneh and
               Ramarathnam Venkatesan},
  title     = {Hardness of Computing the Most Significant Bits of Secret Keys in
               Diffie-Hellman and Related Schemes},
  booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  pages     = {129--142},
  year      = {1996},
  crossref  = {DBLP:conf/crypto/1996},
  url       = {https://doi.org/10.1007/3-540-68697-5_11},
  doi       = {10.1007/3-540-68697-5_11},
  timestamp = {Mon, 22 May 2017 16:14:05 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehV96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehL96,
  author    = {Dan Boneh and
               Richard J. Lipton},
  title     = {Algorithms for Black-Box Fields and their Application to Cryptography
               (Extended Abstract)},
  booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  pages     = {283--297},
  year      = {1996},
  crossref  = {DBLP:conf/crypto/1996},
  url       = {https://doi.org/10.1007/3-540-68697-5_22},
  doi       = {10.1007/3-540-68697-5_22},
  timestamp = {Mon, 22 May 2017 16:14:05 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehL96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/BaumB96,
  author    = {Eric B. Baum and
               Dan Boneh},
  title     = {Running dynamic programming algorithms on a {DNA} computer},
  booktitle = {{DNA} Based Computers, Proceedings of a {DIMACS} Workshop, Princeton,
               New Jersey, USA, June 10-12, 1996},
  pages     = {77--86},
  year      = {1996},
  crossref  = {DBLP:conf/dimacs/dimacs44},
  timestamp = {Tue, 15 Mar 2016 17:08:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dimacs/BaumB96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/BonehDLS96,
  author    = {Dan Boneh and
               Christopher Dunworth and
               Richard J. Lipton and
               Jir{\'{\i}} Sgall},
  title     = {Making {DNA} computers error resistant},
  booktitle = {{DNA} Based Computers, Proceedings of a {DIMACS} Workshop, Princeton,
               New Jersey, USA, June 10-12, 1996},
  pages     = {163--170},
  year      = {1996},
  crossref  = {DBLP:conf/dimacs/dimacs44},
  timestamp = {Tue, 15 Mar 2016 17:08:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dimacs/BonehDLS96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/uss/BonehL96,
  author    = {Dan Boneh and
               Richard J. Lipton},
  title     = {A Revocable Backup System},
  booktitle = {Proceedings of the 6th {USENIX} Security Symposium, San Jose, CA,
               USA, July 22-25, 1996},
  year      = {1996},
  crossref  = {DBLP:conf/uss/1996},
  url       = {https://www.usenix.org/conference/6th-usenix-security-symposium/revocable-backup-system},
  timestamp = {Fri, 19 Aug 2016 15:38:03 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/BonehL96},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/colt/BaumBG95,
  author    = {Eric B. Baum and
               Dan Boneh and
               Charles Garrett},
  title     = {On Genetic Algorithms},
  booktitle = {Proceedings of the Eigth Annual Conference on Computational Learning
               Theory, {COLT} 1995, Santa Cruz, California, USA, July 5-8, 1995},
  pages     = {230--239},
  year      = {1995},
  crossref  = {DBLP:conf/colt/1995},
  url       = {http://doi.acm.org/10.1145/225298.225326},
  doi       = {10.1145/225298.225326},
  timestamp = {Wed, 30 Aug 2017 09:10:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/colt/BaumBG95},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/colt/Boneh95,
  author    = {Dan Boneh},
  title     = {Learning Using Group Representations (Extended Abstract)},
  booktitle = {Proceedings of the Eigth Annual Conference on Computational Learning
               Theory, {COLT} 1995, Santa Cruz, California, USA, July 5-8, 1995},
  pages     = {418--426},
  year      = {1995},
  crossref  = {DBLP:conf/colt/1995},
  url       = {http://doi.acm.org/10.1145/225298.225349},
  doi       = {10.1145/225298.225349},
  timestamp = {Wed, 30 Aug 2017 09:10:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/colt/Boneh95},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehL95,
  author    = {Dan Boneh and
               Richard J. Lipton},
  title     = {Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract)},
  booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  pages     = {424--437},
  year      = {1995},
  crossref  = {DBLP:conf/crypto/1995},
  url       = {https://doi.org/10.1007/3-540-44750-4_34},
  doi       = {10.1007/3-540-44750-4_34},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehL95},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehS95,
  author    = {Dan Boneh and
               James Shaw},
  title     = {Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)},
  booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  pages     = {452--465},
  year      = {1995},
  crossref  = {DBLP:conf/crypto/1995},
  url       = {https://doi.org/10.1007/3-540-44750-4_36},
  doi       = {10.1007/3-540-44750-4_36},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/BonehS95},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/BonehDL95,
  author    = {Dan Boneh and
               Christopher Dunworth and
               Richard J. Lipton},
  title     = {Breaking {DES} using a molecular computer},
  booktitle = {{DNA} Based Computers, Proceedings of a {DIMACS} Workshop, Princeton,
               New Jersey, USA, April 4, 1995},
  pages     = {37--66},
  year      = {1995},
  crossref  = {DBLP:conf/dimacs/dimacs27},
  timestamp = {Fri, 12 Feb 2016 07:36:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dimacs/BonehDL95},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/colt/BonehL93,
  author    = {Dan Boneh and
               Richard J. Lipton},
  title     = {Amplification of Weak Learning under the Uniform Distribution},
  booktitle = {Proceedings of the Sixth Annual {ACM} Conference on Computational
               Learning Theory, {COLT} 1993, Santa Cruz, CA, USA, July 26-28, 1993.},
  pages     = {347--351},
  year      = {1993},
  crossref  = {DBLP:conf/colt/1993},
  url       = {http://doi.acm.org/10.1145/168304.168372},
  doi       = {10.1145/168304.168372},
  timestamp = {Fri, 23 Dec 2011 00:00:00 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/colt/BonehL93},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2017,
  editor    = {Dieter Gollmann and
               Atsuko Miyaji and
               Hiroaki Kikuchi},
  title     = {Applied Cryptography and Network Security - 15th International Conference,
               {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10355},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-61204-1},
  doi       = {10.1007/978-3-319-61204-1},
  isbn      = {978-3-319-61203-4},
  timestamp = {Tue, 04 Jul 2017 13:27:06 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2017,
  editor    = {Helena Handschuh},
  title     = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
               the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
               2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10159},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-52153-4},
  doi       = {10.1007/978-3-319-52153-4},
  isbn      = {978-3-319-52152-7},
  timestamp = {Sun, 21 May 2017 00:20:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2017-3,
  editor    = {Jean{-}S{\'{e}}bastien Coron and
               Jesper Buus Nielsen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10212},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56617-7},
  doi       = {10.1007/978-3-319-56617-7},
  isbn      = {978-3-319-56616-0},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2017-3},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2017-1,
  editor    = {Jean{-}S{\'{e}}bastien Coron and
               Jesper Buus Nielsen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10210},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-56620-7},
  doi       = {10.1007/978-3-319-56620-7},
  isbn      = {978-3-319-56619-1},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2017-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/hotos/2017,
  editor    = {Alexandra Fedorova and
               Andrew Warfield and
               Ivan Beschastnikh and
               Rachit Agarwal},
  title     = {Proceedings of the 16th Workshop on Hot Topics in Operating Systems,
               HotOS 2017, Whistler, BC, Canada, May 8-10, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3102980},
  doi       = {10.1145/3102980},
  isbn      = {978-1-4503-5068-6},
  timestamp = {Wed, 16 Aug 2017 08:41:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/hotos/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/mobisys/2017,
  editor    = {Tanzeem Choudhury and
               Steven Y. Ko and
               Andrew Campbell and
               Deepak Ganesan},
  title     = {Proceedings of the 15th Annual International Conference on Mobile
               Systems, Applications, and Services, MobiSys'17, Niagara Falls, NY,
               USA, June 19-23, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3081333},
  doi       = {10.1145/3081333},
  isbn      = {978-1-4503-4928-4},
  timestamp = {Tue, 20 Jun 2017 12:43:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/mobisys/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/nsdi/2017,
  editor    = {Aditya Akella and
               Jon Howell},
  title     = {14th {USENIX} Symposium on Networked Systems Design and Implementation,
               {NSDI} 2017, Boston, MA, USA, March 27-29, 2017},
  publisher = {{USENIX} Association},
  year      = {2017},
  url       = {https://www.usenix.org/conference/nsdi17},
  isbn      = {978-1-931971-37-9},
  timestamp = {Tue, 28 Mar 2017 15:12:16 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/nsdi/2017},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2017-2,
  editor    = {Serge Fehr},
  title     = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10175},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-662-54388-7},
  doi       = {10.1007/978-3-662-54388-7},
  isbn      = {978-3-662-54387-0},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pkc/2017-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2016-1,
  editor    = {Jung Hee Cheon and
               Tsuyoshi Takagi},
  title     = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10031},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53887-6},
  doi       = {10.1007/978-3-662-53887-6},
  isbn      = {978-3-662-53886-9},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2016-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2976749},
  isbn      = {978-1-4503-4139-4},
  timestamp = {Mon, 24 Oct 2016 15:38:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016-2,
  editor    = {Ioannis G. Askoxylakis and
               Sotiris Ioannidis and
               Sokratis K. Katsikas and
               Catherine A. Meadows},
  title     = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
               in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9879},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45741-3},
  doi       = {10.1007/978-3-319-45741-3},
  isbn      = {978-3-319-45740-6},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/esorics/2016-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ewsn/2016,
  editor    = {Kay R{\"{o}}mer and
               Koen Langendoen and
               Thiemo Voigt},
  title     = {Proceedings of the International Conference on Embedded Wireless Systems
               and Networks, {EWSN} 2016, Graz, Austria, 15-17 February 2016},
  publisher = {Junction Publishing, Canada / {ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2893711},
  isbn      = {978-0-9949886-0-7},
  timestamp = {Mon, 14 Mar 2016 14:41:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ewsn/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2016,
  editor    = {Jens Grossklags and
               Bart Preneel},
  title     = {Financial Cryptography and Data Security - 20th International Conference,
               {FC} 2016, Christ Church, Barbados, February 22-26, 2016, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9603},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-662-54970-4},
  doi       = {10.1007/978-3-662-54970-4},
  isbn      = {978-3-662-54969-8},
  timestamp = {Wed, 17 May 2017 11:08:36 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/2016},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015,
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-6, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2810103},
  isbn      = {978-1-4503-3832-5},
  timestamp = {Sat, 03 Oct 2015 19:54:04 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2015-2,
  editor    = {Elisabeth Oswald and
               Marc Fischlin},
  title     = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9057},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46803-6},
  doi       = {10.1007/978-3-662-46803-6},
  isbn      = {978-3-662-46802-9},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2015-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sp/2015,
  title     = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
               CA, USA, May 17-21, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7160813},
  isbn      = {978-1-4673-6949-7},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2015,
  editor    = {Jaeyeon Jung and
               Thorsten Holz},
  title     = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
               D.C., USA, August 12-14, 2015},
  publisher = {{USENIX} Association},
  year      = {2015},
  url       = {https://www.usenix.org/conference/usenixsecurity15},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2014-1,
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8873},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45611-8},
  doi       = {10.1007/978-3-662-45611-8},
  isbn      = {978-3-662-45610-1},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2014-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2014-1,
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8616},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44371-2},
  doi       = {10.1007/978-3-662-44371-2},
  isbn      = {978-3-662-44370-5},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2014-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2014,
  editor    = {Phong Q. Nguyen and
               Elisabeth Oswald},
  title     = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8441},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-55220-5},
  doi       = {10.1007/978-3-642-55220-5},
  isbn      = {978-3-642-55219-9},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sp/2014,
  title     = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
               CA, USA, May 18-21, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6954656},
  isbn      = {978-1-4799-4686-0},
  timestamp = {Tue, 02 Dec 2014 18:47:29 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2014,
  editor    = {Kevin Fu and
               Jaeyeon Jung},
  title     = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
               USA, August 20-22, 2014},
  publisher = {{USENIX} Association},
  year      = {2014},
  url       = {https://www.usenix.org/conference/usenixsecurity14},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/woot/2014,
  editor    = {Sergey Bratus and
               Felix F. X. Lindner},
  title     = {8th {USENIX} Workshop on Offensive Technologies, {WOOT} '14, San Diego,
               CA, USA, August 19, 2014},
  publisher = {{USENIX} Association},
  year      = {2014},
  url       = {http://blogs.usenix.org/conference/woot14},
  timestamp = {Thu, 11 Sep 2014 17:28:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/woot/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2013,
  editor    = {Michael J. Jacobson Jr. and
               Michael E. Locasto and
               Payman Mohassel and
               Reihaneh Safavi{-}Naini},
  title     = {Applied Cryptography and Network Security - 11th International Conference,
               {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7954},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38980-1},
  doi       = {10.1007/978-3-642-38980-1},
  isbn      = {978-3-642-38979-5},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2013-1,
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8269},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-42033-7},
  doi       = {10.1007/978-3-642-42033-7},
  isbn      = {978-3-642-42032-0},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2013-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2013-2,
  editor    = {Kazue Sako and
               Palash Sarkar},
  title     = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8270},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-42045-0},
  doi       = {10.1007/978-3-642-42045-0},
  isbn      = {978-3-642-42044-3},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2013-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013,
  editor    = {Ahmad{-}Reza Sadeghi and
               Virgil D. Gligor and
               Moti Yung},
  title     = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
               CCS'13, Berlin, Germany, November 4-8, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2508859},
  isbn      = {978-1-4503-2477-9},
  timestamp = {Fri, 08 Nov 2013 09:43:20 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-2,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8043},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40084-1},
  doi       = {10.1007/978-3-642-40084-1},
  isbn      = {978-3-642-40083-4},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2013-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2013-1,
  editor    = {Ran Canetti and
               Juan A. Garay},
  title     = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8042},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40041-4},
  doi       = {10.1007/978-3-642-40041-4},
  isbn      = {978-3-642-40040-7},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2013-1},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2013,
  editor    = {Thomas Johansson and
               Phong Q. Nguyen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7881},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9},
  doi       = {10.1007/978-3-642-38348-9},
  isbn      = {978-3-642-38347-2},
  timestamp = {Wed, 24 May 2017 08:31:21 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pet/2013,
  editor    = {Emiliano De Cristofaro and
               Matthew K. Wright},
  title     = {Privacy Enhancing Technologies - 13th International Symposium, {PETS}
               2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7981},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39077-7},
  doi       = {10.1007/978-3-642-39077-7},
  isbn      = {978-3-642-39076-0},
  timestamp = {Tue, 23 May 2017 01:10:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pet/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sp/2013,
  title     = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
               CA, USA, May 19-22, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6547086},
  isbn      = {978-1-4673-6166-8},
  timestamp = {Thu, 08 Jan 2015 16:59:44 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2012,
  editor    = {Xiaoyun Wang and
               Kazue Sako},
  title     = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Beijing, China, December 2-6, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7658},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-34961-4},
  doi       = {10.1007/978-3-642-34961-4},
  isbn      = {978-3-642-34960-7},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn      = {978-1-4503-1651-4},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/innovations/2012,
  editor    = {Shafi Goldwasser},
  title     = {Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA,
               January 8-10, 2012},
  publisher = {{ACM}},
  year      = {2012},
  isbn      = {978-1-4503-1115-1},
  timestamp = {Sat, 24 Mar 2012 15:58:31 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/innovations/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ndss/2012,
  title     = {19th Annual Network and Distributed System Security Symposium, {NDSS}
               2012, San Diego, California, USA, February 5-8, 2012},
  publisher = {The Internet Society},
  year      = {2012},
  url       = {http://www.internetsociety.org/events/ndss-symposium-2012},
  timestamp = {Wed, 18 Sep 2013 19:36:26 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pet/2012,
  editor    = {Simone Fischer{-}H{\"{u}}bner and
               Matthew K. Wright},
  title     = {Privacy Enhancing Technologies - 12th International Symposium, {PETS}
               2012, Vigo, Spain, July 11-13, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7384},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31680-7},
  doi       = {10.1007/978-3-642-31680-7},
  isbn      = {978-3-642-31679-1},
  timestamp = {Tue, 23 May 2017 01:10:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pet/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2012,
  editor    = {Ronald Cramer},
  title     = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7194},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9},
  doi       = {10.1007/978-3-642-28914-9},
  isbn      = {978-3-642-28913-2},
  timestamp = {Tue, 23 May 2017 01:06:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2012,
  editor    = {Tadayoshi Kohno},
  title     = {Proceedings of the 21th {USENIX} Security Symposium, Bellevue, WA,
               USA, August 8-10, 2012},
  publisher = {{USENIX} Association},
  year      = {2012},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A334},
  timestamp = {Fri, 19 Aug 2016 15:38:03 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2012foci,
  editor    = {Roger Dingledine and
               Joss Wright},
  title     = {2nd {USENIX} Workshop on Free and Open Communications on the Internet,
               {FOCI} '12, Bellevue, WA, USA, August 6, 2012},
  publisher = {{USENIX} Association},
  year      = {2012},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A358},
  timestamp = {Tue, 20 May 2014 19:56:41 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2012foci},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/www/2012,
  editor    = {Alain Mille and
               Fabien L. Gandon and
               Jacques Misselis and
               Michael Rabinovich and
               Steffen Staab},
  title     = {Proceedings of the 21st World Wide Web Conference 2012, {WWW} 2012,
               Lyon, France, April 16-20, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2187836},
  isbn      = {978-1-4503-1229-5},
  timestamp = {Thu, 19 Apr 2012 14:34:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/www/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2011,
  editor    = {Dong Hoon Lee and
               Xiaoyun Wang},
  title     = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7073},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0},
  doi       = {10.1007/978-3-642-25385-0},
  isbn      = {978-3-642-25384-3},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2011,
  editor    = {Kenneth G. Paterson},
  title     = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6632},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20465-4},
  doi       = {10.1007/978-3-642-20465-4},
  isbn      = {978-3-642-20464-7},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ndss/2011,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2011, San Diego, California, USA, 6th February - 9th February
               2011},
  publisher = {The Internet Society},
  year      = {2011},
  url       = {http://www.isoc.org/isoc/conferences/ndss/11/},
  timestamp = {Wed, 31 Aug 2011 14:05:35 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2011,
  editor    = {Dario Catalano and
               Nelly Fazio and
               Rosario Gennaro and
               Antonio Nicolosi},
  title     = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
               on Practice and Theory in Public Key Cryptography, Taormina, Italy,
               March 6-9, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6571},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19379-8},
  doi       = {10.1007/978-3-642-19379-8},
  isbn      = {978-3-642-19378-1},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pkc/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sp/2011,
  title     = {32nd {IEEE} Symposium on Security and Privacy, S{\&}P 2011, 22-25
               May 2011, Berkeley, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5955408},
  isbn      = {978-1-4577-0147-4},
  timestamp = {Thu, 08 Jan 2015 16:59:44 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sp/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2011,
  editor    = {Yuval Ishai},
  title     = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
               2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6597},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19571-6},
  doi       = {10.1007/978-3-642-19571-6},
  isbn      = {978-3-642-19570-9},
  timestamp = {Tue, 13 Jun 2017 11:30:16 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wisec/2011,
  editor    = {Dieter Gollmann and
               Dirk Westhoff and
               Gene Tsudik and
               N. Asokan},
  title     = {Proceedings of the Fourth {ACM} Conference on Wireless Network Security,
               {WISEC} 2011, Hamburg, Germany, June 14-17, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0692-8},
  timestamp = {Wed, 24 Aug 2011 20:02:12 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wisec/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wmcsa/2011,
  editor    = {Anthony LaMarca and
               Landon P. Cox},
  title     = {12th Workshop on Mobile Computing Systems and Applications, HotMobile
               '11, Phoenix, AZ, USA, March 1-3, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://doi.acm.org/10.1145/2184489},
  doi       = {10.1145/2184489},
  isbn      = {978-1-4503-0649-2},
  timestamp = {Wed, 30 Jul 2014 17:23:27 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wmcsa/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/crypt/2011,
  editor    = {Henk C. A. van Tilborg and
               Sushil Jajodia},
  title     = {Encyclopedia of Cryptography and Security, 2nd Ed},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-1-4419-5906-5},
  doi       = {10.1007/978-1-4419-5906-5},
  isbn      = {978-1-4419-5905-8},
  timestamp = {Tue, 16 May 2017 14:01:51 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010,
  editor    = {Ehab Al{-}Shaer and
               Angelos D. Keromytis and
               Vitaly Shmatikov},
  title     = {Proceedings of the 17th {ACM} Conference on Computer and Communications
               Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0245-6},
  timestamp = {Mon, 22 Nov 2010 20:51:09 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2010,
  editor    = {Tal Rabin},
  title     = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6223},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7},
  doi       = {10.1007/978-3-642-14623-7},
  isbn      = {978-3-642-14622-0},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/drm/2010,
  editor    = {Ehab Al{-}Shaer and
               Hongxia Jin and
               Marc Joye},
  title     = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
               Chicago, Illinois, USA, October 4, 2010},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1866870},
  isbn      = {978-1-4503-0091-9},
  timestamp = {Wed, 28 Mar 2012 12:54:32 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/drm/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/esorics/2010,
  editor    = {Dimitris Gritzalis and
               Bart Preneel and
               Marianthi Theoharidou},
  title     = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
               in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6345},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15497-3},
  doi       = {10.1007/978-3-642-15497-3},
  isbn      = {978-3-642-15496-6},
  timestamp = {Thu, 15 Jun 2017 21:35:50 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/esorics/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2010,
  editor    = {Henri Gilbert},
  title     = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               French Riviera, May 30 - June 3, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6110},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13190-5},
  doi       = {10.1007/978-3-642-13190-5},
  isbn      = {978-3-642-13189-9},
  timestamp = {Wed, 24 May 2017 08:31:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/mobicase/2010,
  editor    = {Martin L. Griss and
               Guang Yang},
  title     = {Mobile Computing, Applications, and Services - Second International
               {ICST} Conference, MobiCASE 2010, Santa Clara, CA, USA, October 25-28,
               2010, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {76},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29336-8},
  doi       = {10.1007/978-3-642-29336-8},
  isbn      = {978-3-642-29335-1},
  timestamp = {Thu, 25 May 2017 00:43:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/mobicase/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ndss/2010,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
               2010},
  publisher = {The Internet Society},
  year      = {2010},
  url       = {http://www.isoc.org/isoc/conferences/ndss/10/},
  timestamp = {Wed, 31 Aug 2011 13:59:42 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2010,
  editor    = {Phong Q. Nguyen and
               David Pointcheval},
  title     = {Public Key Cryptography - {PKC} 2010, 13th International Conference
               on Practice and Theory in Public Key Cryptography, Paris, France,
               May 26-28, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6056},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13013-7},
  doi       = {10.1007/978-3-642-13013-7},
  isbn      = {978-3-642-13012-0},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pkc/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2010,
  title     = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
               2010, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2010},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A21},
  timestamp = {Wed, 14 May 2014 19:33:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2010cset,
  editor    = {Terry V. Benzel and
               Jelena Mirkovic and
               Angelos Stavrou},
  title     = {3rd Workshop on Cyber Security Experimentation and Test, {CSET} '10,
               Washington, D.C., USA, August 9, 2010},
  publisher = {{USENIX} Association},
  year      = {2010},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A15},
  timestamp = {Tue, 20 May 2014 12:28:08 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2010cset},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acns/2009,
  editor    = {Michel Abdalla and
               David Pointcheval and
               Pierre{-}Alain Fouque and
               Damien Vergnaud},
  title     = {Applied Cryptography and Network Security, 7th International Conference,
               {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5536},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-01957-9},
  doi       = {10.1007/978-3-642-01957-9},
  isbn      = {978-3-642-01956-2},
  timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acns/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acsac/2009,
  title     = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
               2009, Honolulu, Hawaii, 7-11 December 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5379501},
  isbn      = {978-0-7695-3919-5},
  timestamp = {Mon, 04 Aug 2014 17:08:32 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acsac/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009,
  editor    = {Ehab Al{-}Shaer and
               Somesh Jha and
               Angelos D. Keromytis},
  title     = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-894-0},
  timestamp = {Wed, 25 Nov 2009 10:26:38 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2009,
  editor    = {Stanislaw Jarecki and
               Gene Tsudik},
  title     = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5443},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1},
  doi       = {10.1007/978-3-642-00468-1},
  isbn      = {978-3-642-00467-4},
  timestamp = {Wed, 24 May 2017 08:27:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pkc/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2009P9141,
  editor    = {Dan Boneh and
               {\'{U}}lfar Erlingsson and
               Martin Johns and
               Benjamin Livshits},
  title     = {Web Application Security, 29.03. - 03.04.2009},
  series    = {Dagstuhl Seminar Proceedings},
  volume    = {09141},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year      = {2009},
  url       = {http://drops.dagstuhl.de/portals/09141/},
  timestamp = {Wed, 08 Apr 2015 15:57:17 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dagstuhl/2009P9141},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2008,
  editor    = {Josef Pieprzyk},
  title     = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5350},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89255-7},
  doi       = {10.1007/978-3-540-89255-7},
  isbn      = {978-3-540-89254-0},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asplos/2008,
  editor    = {Susan J. Eggers and
               James R. Larus},
  title     = {Proceedings of the 13th International Conference on Architectural
               Support for Programming Languages and Operating Systems, {ASPLOS}
               2008, Seattle, WA, USA, March 1-5, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-958-6},
  timestamp = {Tue, 08 Apr 2008 14:29:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asplos/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008,
  editor    = {Peng Ning and
               Paul F. Syverson and
               Somesh Jha},
  title     = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-810-7},
  timestamp = {Tue, 11 Nov 2008 10:39:24 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2008,
  editor    = {David A. Wagner},
  title     = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5157},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-85174-5},
  doi       = {10.1007/978-3-540-85174-5},
  isbn      = {978-3-540-85173-8},
  timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2008,
  title     = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
               2008, October 25-28, 2008, Philadelphia, PA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4690923},
  isbn      = {978-0-7695-3436-7},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007,
  editor    = {Peng Ning and
               Sabrina De Capitani di Vimercati and
               Paul F. Syverson},
  title     = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
               Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-703-2},
  timestamp = {Fri, 22 Feb 2008 08:21:16 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2007,
  editor    = {Alfred Menezes},
  title     = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4622},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74143-5},
  doi       = {10.1007/978-3-540-74143-5},
  isbn      = {978-3-540-74142-8},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/focs/2007,
  title     = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS}
               2007), October 20-23, 2007, Providence, RI, USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4389466},
  isbn      = {978-0-7695-3010-9},
  timestamp = {Mon, 15 Dec 2014 18:48:44 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/focs/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ndss/2007,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
               2007},
  publisher = {The Internet Society},
  year      = {2007},
  timestamp = {Thu, 16 Apr 2009 21:25:40 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pairing/2007,
  editor    = {Tsuyoshi Takagi and
               Tatsuaki Okamoto and
               Eiji Okamoto and
               Takeshi Okamoto},
  title     = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
               Tokyo, Japan, July 2-4, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4575},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-73489-5},
  doi       = {10.1007/978-3-540-73489-5},
  isbn      = {978-3-540-73488-8},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pairing/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/soups/2007,
  editor    = {Lorrie Faith Cranor},
  title     = {Proceedings of the 3rd Symposium on Usable Privacy and Security, {SOUPS}
               2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007},
  series    = {{ACM} International Conference Proceeding Series},
  volume    = {229},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-801-5},
  timestamp = {Tue, 10 Jun 2008 10:25:18 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/soups/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2007,
  editor    = {Salil P. Vadhan},
  title     = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
               2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4392},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-70936-7},
  doi       = {10.1007/978-3-540-70936-7},
  isbn      = {3-540-70935-5},
  timestamp = {Fri, 02 Jun 2017 13:01:06 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2007hotsec,
  title     = {2nd {USENIX} Workshop on Hot Topics in Security, HotSec'07, Boston,
               MA, USA, August 7, 2007},
  publisher = {{USENIX} Association},
  year      = {2007},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A108},
  timestamp = {Wed, 14 May 2014 20:55:38 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2007hotsec},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/wpes/2007,
  editor    = {Peng Ning and
               Ting Yu},
  title     = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-883-1},
  timestamp = {Mon, 07 Apr 2008 08:32:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/wpes/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/www/2007,
  editor    = {Carey L. Williamson and
               Mary Ellen Zurko and
               Peter F. Patel{-}Schneider and
               Prashant J. Shenoy},
  title     = {Proceedings of the 16th International Conference on World Wide Web,
               {WWW} 2007, Banff, Alberta, Canada, May 8-12, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-654-7},
  timestamp = {Wed, 22 Aug 2007 09:51:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/www/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/2007P7381,
  editor    = {Johannes Bl{\"{o}}mer and
               Dan Boneh and
               Ronald Cramer and
               Ueli M. Maurer},
  title     = {Cryptography, 16.09. - 21.09.2007},
  series    = {Dagstuhl Seminar Proceedings},
  volume    = {07381},
  publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
               (IBFI), Schloss Dagstuhl, Germany},
  year      = {2008},
  url       = {http://drops.dagstuhl.de/portals/07381/},
  timestamp = {Wed, 19 Jun 2013 12:19:16 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dagstuhl/2007P7381},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006usa,
  editor    = {Ari Juels and
               Rebecca N. Wright and
               Sabrina De Capitani di Vimercati},
  title     = {Proceedings of the 13th {ACM} Conference on Computer and Communications
               Security, {CCS} 2006, Alexandria, VA, USA, Ioctober 30 - November
               3, 2006},
  publisher = {{ACM}},
  year      = {2006},
  timestamp = {Mon, 11 Dec 2006 11:03:22 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2006usa},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2006,
  editor    = {Cynthia Dwork},
  title     = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4117},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11818175},
  doi       = {10.1007/11818175},
  isbn      = {3-540-37432-9},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2006,
  editor    = {David Pointcheval},
  title     = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
               the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3860},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11605805},
  doi       = {10.1007/11605805},
  isbn      = {3-540-31033-9},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2006,
  editor    = {Serge Vaudenay},
  title     = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4004},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11761679},
  doi       = {10.1007/11761679},
  isbn      = {3-540-34546-9},
  timestamp = {Fri, 02 Jun 2017 13:01:08 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/2006,
  editor    = {Giovanni Di Crescenzo and
               Aviel D. Rubin},
  title     = {Financial Cryptography and Data Security, 10th International Conference,
               {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
               Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4107},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11889663},
  doi       = {10.1007/11889663},
  isbn      = {3-540-46255-4},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/pkc/2006,
  editor    = {Moti Yung and
               Yevgeniy Dodis and
               Aggelos Kiayias and
               Tal Malkin},
  title     = {Public Key Cryptography - {PKC} 2006, 9th International Conference
               on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
               April 24-26, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3958},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11745853},
  doi       = {10.1007/11745853},
  isbn      = {3-540-33851-9},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/pkc/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2006,
  editor    = {Angelos D. Keromytis},
  title     = {Proceedings of the 15th {USENIX} Security Symposium, Vancouver, BC,
               Canada, July 31 - August 4, 2006},
  publisher = {{USENIX} Association},
  year      = {2006},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A140},
  timestamp = {Fri, 19 Aug 2016 15:38:03 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/www/2006,
  editor    = {Les Carr and
               David De Roure and
               Arun Iyengar and
               Carole A. Goble and
               Michael Dahlin},
  title     = {Proceedings of the 15th international conference on World Wide Web,
               {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-323-9},
  timestamp = {Mon, 17 Jul 2006 14:10:19 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/www/2006},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2005,
  editor    = {Victor Shoup},
  title     = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3621},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11535218},
  doi       = {10.1007/11535218},
  isbn      = {3-540-28114-2},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2005,
  editor    = {Alfred Menezes},
  title     = {Topics in Cryptology - {CT-RSA} 2005, The Cryptographers' Track at
               the {RSA} Conference 2005, San Francisco, CA, USA, February 14-18,
               2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3376},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b105222},
  doi       = {10.1007/b105222},
  isbn      = {3-540-24399-2},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2005,
  editor    = {Ronald Cramer},
  title     = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3494},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b136415},
  doi       = {10.1007/b136415},
  isbn      = {3-540-25910-4},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/tcc/2005,
  editor    = {Joe Kilian},
  title     = {Theory of Cryptography, Second Theory of Cryptography Conference,
               {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3378},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b106171},
  doi       = {10.1007/b106171},
  isbn      = {3-540-24573-1},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/tcc/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2005,
  editor    = {Patrick D. McDaniel},
  title     = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
               USA, July 31 - August 5, 2005},
  publisher = {{USENIX} Association},
  year      = {2005},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A156},
  timestamp = {Thu, 17 Nov 2016 19:38:24 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/crypt/2005,
  editor    = {Henk C. A. van Tilborg},
  title     = {Encyclopedia of Cryptography and Security},
  publisher = {Springer},
  year      = {2005},
  isbn      = {978-0-387-23473-1},
  timestamp = {Fri, 25 Nov 2011 17:44:27 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/reference/crypt/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2004ccs,
  editor    = {Vijayalakshmi Atluri and
               Birgit Pfitzmann and
               Patrick D. McDaniel},
  title     = {Proceedings of the 11th {ACM} Conference on Computer and Communications
               Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  publisher = {{ACM}},
  year      = {2004},
  isbn      = {1-58113-961-6},
  timestamp = {Thu, 17 Nov 2016 19:38:29 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2004ccs},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2004,
  editor    = {Matthew K. Franklin},
  title     = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
               CryptologyConference, Santa Barbara, California, USA, August 15-19,
               2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3152},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b99099},
  doi       = {10.1007/b99099},
  isbn      = {3-540-22668-0},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2004,
  editor    = {Christian Cachin and
               Jan Camenisch},
  title     = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
               on the Theory and Applications of Cryptographic Techniques, Interlaken,
               Switzerland, May 2-6, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3027},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b97182},
  doi       = {10.1007/b97182},
  isbn      = {3-540-21935-8},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2004},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2003,
  editor    = {Marc Joye},
  title     = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
               the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2612},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36563-X},
  doi       = {10.1007/3-540-36563-X},
  isbn      = {3-540-00847-0},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2003,
  editor    = {Eli Biham},
  title     = {Advances in Cryptology - {EUROCRYPT} 2003, International Conference
               on the Theory and Applications of Cryptographic Techniques, Warsaw,
               Poland, May 4-8, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2656},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-39200-9},
  doi       = {10.1007/3-540-39200-9},
  isbn      = {3-540-14039-5},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/hotos/2003,
  editor    = {Michael B. Jones},
  title     = {Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems,
               May 18-21, 2003, Lihue (Kauai), Hawaii, {USA}},
  publisher = {{USENIX}},
  year      = {2003},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A186},
  isbn      = {1-931971-17-X},
  timestamp = {Mon, 19 May 2014 17:54:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/hotos/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isw/2003,
  editor    = {Colin Boyd and
               Wenbo Mao},
  title     = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
               UK, October 1-3, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2851},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b13828},
  doi       = {10.1007/b13828},
  isbn      = {3-540-20176-9},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/isw/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ndss/2003,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2003, San Diego, California, {USA}},
  publisher = {The Internet Society},
  year      = {2003},
  isbn      = {1-891562-16-9},
  timestamp = {Thu, 23 Jun 2016 15:53:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/podc/2003,
  editor    = {Elizabeth Borowsky and
               Sergio Rajsbaum},
  title     = {Proceedings of the Twenty-Second {ACM} Symposium on Principles of
               Distributed Computing, {PODC} 2003, Boston, Massachusetts, USA, July
               13-16, 2003},
  publisher = {{ACM}},
  year      = {2003},
  url       = {http://dl.acm.org/citation.cfm?id=872035},
  isbn      = {1-58113-708-7},
  timestamp = {Wed, 23 May 2012 14:26:09 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/podc/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/sosp/2003,
  editor    = {Michael L. Scott and
               Larry L. Peterson},
  title     = {Proceedings of the 19th {ACM} Symposium on Operating Systems Principles
               2003, {SOSP} 2003, Bolton Landing, NY, USA, October 19-22, 2003},
  publisher = {{ACM}},
  year      = {2003},
  url       = {http://doi.acm.org/10.1145/945445},
  doi       = {10.1145/945445},
  isbn      = {1-58113-757-5},
  timestamp = {Mon, 22 Jun 2015 17:24:47 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/sosp/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2003,
  title     = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C.,
               USA, August 4-8, 2003},
  publisher = {{USENIX} Association},
  year      = {2003},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A182},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2002,
  editor    = {Yuliang Zheng},
  title     = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2501},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36178-2},
  doi       = {10.1007/3-540-36178-2},
  isbn      = {3-540-00171-9},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2002drm,
  editor    = {Joan Feigenbaum},
  title     = {Security and Privacy in Digital Rights Management, {ACM} {CCS-9} Workshop,
               {DRM} 2002, Washington, DC, USA, November 18, 2002, Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2696},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b11725},
  doi       = {10.1007/b11725},
  isbn      = {3-540-40410-4},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2002drm},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2002,
  editor    = {Vijayalakshmi Atluri},
  title     = {Proceedings of the 9th {ACM} Conference on Computer and Communications
               Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  publisher = {{ACM}},
  year      = {2002},
  url       = {http://dl.acm.org/citation.cfm?id=586110},
  isbn      = {1-58113-612-9},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ndss/2002,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 2002, San Diego, California, {USA}},
  publisher = {The Internet Society},
  year      = {2002},
  isbn      = {1-891562-14-2},
  timestamp = {Wed, 15 Dec 2004 13:45:46 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/2002},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2001,
  editor    = {Colin Boyd},
  title     = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2248},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45682-1},
  doi       = {10.1007/3-540-45682-1},
  isbn      = {3-540-42987-5},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2001,
  editor    = {Joe Kilian},
  title     = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2139},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44647-8},
  doi       = {10.1007/3-540-44647-8},
  isbn      = {3-540-42456-3},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2001,
  editor    = {David Naccache},
  title     = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
               {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2020},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45353-9},
  doi       = {10.1007/3-540-45353-9},
  isbn      = {3-540-41898-9},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ctrsa/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2001,
  editor    = {Birgit Pfitzmann},
  title     = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
               on the Theory and Application of Cryptographic Techniques, Innsbruck,
               Austria, May 6-10, 2001, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {2045},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44987-6},
  doi       = {10.1007/3-540-44987-6},
  isbn      = {3-540-42070-3},
  timestamp = {Fri, 26 May 2017 14:09:16 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/2001,
  editor    = {Dan S. Wallach},
  title     = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
               D.C., {USA}},
  publisher = {{USENIX}},
  year      = {2001},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A204},
  timestamp = {Wed, 14 May 2014 19:33:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/2001},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2000,
  editor    = {Tatsuaki Okamoto},
  title     = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1976},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44448-3},
  doi       = {10.1007/3-540-44448-3},
  isbn      = {3-540-41404-5},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asplos/2000,
  editor    = {Larry Rudolph and
               Anoop Gupta},
  title     = {{ASPLOS-IX} Proceedings of the 9th International Conference on Architectural
               Support for Programming Languages and Operating Systems, Cambridge,
               MA, USA, November 12-15, 2000},
  publisher = {{ACM} Press},
  year      = {2000},
  url       = {http://dl.acm.org/citation.cfm?id=378993},
  isbn      = {1-58113-317-0},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asplos/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2000,
  editor    = {Mihir Bellare},
  title     = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1880},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44598-6},
  doi       = {10.1007/3-540-44598-6},
  isbn      = {3-540-67907-3},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2000,
  editor    = {Bimal K. Roy and
               Eiji Okamoto},
  title     = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
               in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1977},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44495-5},
  doi       = {10.1007/3-540-44495-5},
  isbn      = {3-540-41452-5},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/indocrypt/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/stoc/2000,
  editor    = {F. Frances Yao and
               Eugene M. Luks},
  title     = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory
               of Computing, May 21-23, 2000, Portland, OR, {USA}},
  publisher = {{ACM}},
  year      = {2000},
  isbn      = {1-58113-184-4},
  timestamp = {Mon, 17 Oct 2011 15:55:10 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/stoc/2000},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/1999,
  editor    = {Juzar Motiwalla and
               Gene Tsudik},
  title     = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
               Communications Security, Singapore, November 1-4, 1999},
  publisher = {{ACM}},
  year      = {1999},
  url       = {http://dl.acm.org/citation.cfm?id=319709},
  isbn      = {1-58113-148-8},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1999,
  editor    = {Michael J. Wiener},
  title     = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1666},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48405-1},
  doi       = {10.1007/3-540-48405-1},
  isbn      = {3-540-66347-9},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/99,
  editor    = {Jacques Stern},
  title     = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
               on the Theory and Application of Cryptographic Techniques, Prague,
               Czech Republic, May 2-6, 1999, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1592},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48910-X},
  doi       = {10.1007/3-540-48910-X},
  isbn      = {3-540-65889-0},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/99},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fc/1999,
  editor    = {Matthew K. Franklin},
  title     = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
               British West Indies, February 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1648},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48390-X},
  doi       = {10.1007/3-540-48390-X},
  isbn      = {3-540-66362-2},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fc/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ndss/1999,
  title     = {Proceedings of the Network and Distributed System Security Symposium,
               {NDSS} 1999, San Diego, California, {USA}},
  publisher = {The Internet Society},
  year      = {1999},
  isbn      = {1-891562-04-5},
  timestamp = {Mon, 07 Feb 2005 15:56:32 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ndss/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/1999,
  editor    = {G. Winfield Treese},
  title     = {Proceedings of the 8th {USENIX} Security Symposium, Washington, D.C.,
               August 23-26, 1999},
  publisher = {{USENIX} Association},
  year      = {1999},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A219},
  timestamp = {Fri, 19 Aug 2016 15:38:02 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/1999},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ants/1998,
  editor    = {Joe Buhler},
  title     = {Algorithmic Number Theory, Third International Symposium, ANTS-III,
               Portland, Oregon, USA, June 21-25, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1423},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0054849},
  doi       = {10.1007/BFb0054849},
  isbn      = {3-540-64657-4},
  timestamp = {Tue, 23 May 2017 11:53:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ants/1998},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1998,
  editor    = {Kazuo Ohta and
               Dingyi Pei},
  title     = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Beijing, China, October 18-22, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1514},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/3-540-49649-1},
  doi       = {10.1007/3-540-49649-1},
  isbn      = {3-540-65109-8},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asiacrypt/1998},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/98,
  editor    = {Kaisa Nyberg},
  title     = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
               on the Theory and Application of Cryptographic Techniques, Espoo,
               Finland, May 31 - June 4, 1998, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1403},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0054112},
  doi       = {10.1007/BFb0054112},
  isbn      = {3-540-64518-7},
  timestamp = {Tue, 23 May 2017 11:53:59 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/98},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uwec/1998,
  editor    = {Bennet S. Yee},
  title     = {Proceedings of the 3rd {USENIX} Workshop on Electronic Commerce, Boston,
               Massachusetts, USA, August 31 - September 3, 1998},
  publisher = {{USENIX} Association},
  year      = {1998},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A231},
  timestamp = {Tue, 27 May 2014 10:34:54 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uwec/1998},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/acisp/1997,
  editor    = {Vijay Varadharajan and
               Josef Pieprzyk and
               Yi Mu},
  title     = {Information Security and Privacy, Second Australasian Conference,
               ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1270},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/BFb0027916},
  doi       = {10.1007/BFb0027916},
  isbn      = {3-540-63232-8},
  timestamp = {Mon, 22 May 2017 17:11:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/acisp/1997},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1997,
  editor    = {Burton S. Kaliski Jr.},
  title     = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1294},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/BFb0052223},
  doi       = {10.1007/BFb0052223},
  isbn      = {3-540-63384-7},
  timestamp = {Mon, 22 May 2017 17:11:20 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1997},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/97,
  editor    = {Walter Fumy},
  title     = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
               on the Theory and Application of Cryptographic Techniques, Konstanz,
               Germany, May 11-15, 1997, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1233},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/3-540-69053-0},
  doi       = {10.1007/3-540-69053-0},
  isbn      = {3-540-62975-0},
  timestamp = {Mon, 22 May 2017 17:12:28 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/eurocrypt/97},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/istcs/1997,
  title     = {Fifth Israel Symposium on Theory of Computing and Systems, {ISTCS}
               1997, Ramat-Gan, Israel, June 17-19, 1997, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1997},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4625},
  isbn      = {0-8186-8037-7},
  timestamp = {Tue, 31 May 2016 15:27:26 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/istcs/1997},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/soda/1997,
  editor    = {Michael E. Saks},
  title     = {Proceedings of the Eighth Annual {ACM-SIAM} Symposium on Discrete
               Algorithms, 5-7 January 1997, New Orleans, Louisiana},
  publisher = {{ACM/SIAM}},
  year      = {1997},
  url       = {http://dl.acm.org/citation.cfm?id=314161},
  isbn      = {0-89871-390-0},
  timestamp = {Fri, 07 Dec 2012 17:02:08 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/soda/1997},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1996,
  editor    = {Neal Koblitz},
  title     = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1109},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/3-540-68697-5},
  doi       = {10.1007/3-540-68697-5},
  isbn      = {3-540-61512-1},
  timestamp = {Mon, 22 May 2017 16:14:05 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1996},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dimacs/dimacs44,
  editor    = {Laura F. Landweber and
               Eric B. Baum},
  title     = {{DNA} Based Computers, Proceedings of a {DIMACS} Workshop, Princeton,
               New Jersey, USA, June 10-12, 1996},
  series    = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume    = {44},
  publisher = {{DIMACS/AMS}},
  year      = {1999},
  url       = {http://dimacs.rutgers.edu/Volumes/Vol44.html},
  timestamp = {Tue, 15 Mar 2016 17:08:06 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dimacs/dimacs44},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/uss/1996,
  title     = {Proceedings of the 6th {USENIX} Security Symposium, San Jose, CA,
               USA, July 22-25, 1996},
  publisher = {{USENIX} Association},
  year      = {1996},
  url       = {https://www.usenix.org/publications/proceedings/?f[0]=im_group_audience%3A245},
  timestamp = {Fri, 19 Aug 2016 15:38:03 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/uss/1996},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/colt/1995,
  editor    = {Wolfgang Maass},
  title     = {Proceedings of the Eigth Annual Conference on Computational Learning
               Theory, {COLT} 1995, Santa Cruz, California, USA, July 5-8, 1995},
  publisher = {{ACM}},
  year      = {1995},
  url       = {http://dl.acm.org/citation.cfm?id=225298},
  isbn      = {0-89791-723-5},
  timestamp = {Wed, 30 Aug 2017 09:10:31 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/colt/1995},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/1995,
  editor    = {Don Coppersmith},
  title     = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {963},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/3-540-44750-4},
  doi       = {10.1007/3-540-44750-4},
  isbn      = {3-540-60221-6},
  timestamp = {Sat, 20 May 2017 15:32:52 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/crypto/1995},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/dimacs/dimacs27,
  editor    = {Richard J. Lipton and
               Eric B. Baum},
  title     = {{DNA} Based Computers, Proceedings of a {DIMACS} Workshop, Princeton,
               New Jersey, USA, April 4, 1995},
  series    = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume    = {27},
  publisher = {{DIMACS/AMS}},
  year      = {1995},
  url       = {http://dimacs.rutgers.edu/Volumes/Vol27.html},
  timestamp = {Fri, 12 Feb 2016 07:36:52 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/dimacs/dimacs27},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/colt/1993,
  editor    = {Lenny Pitt},
  title     = {Proceedings of the Sixth Annual {ACM} Conference on Computational
               Learning Theory, {COLT} 1993, Santa Cruz, CA, USA, July 26-28, 1993},
  publisher = {{ACM}},
  year      = {1993},
  url       = {http://dl.acm.org/citation.cfm?id=168304},
  isbn      = {0-89791-611-5},
  timestamp = {Mon, 12 Dec 2011 15:03:15 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/colt/1993},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier